General

  • Target

    d11efc2ba3578e6a146a0f10774ad285

  • Size

    109KB

  • Sample

    231220-sfbz6sddh5

  • MD5

    d11efc2ba3578e6a146a0f10774ad285

  • SHA1

    e3352f49e4aa5b07c1ecce3b7d9f567ba2e96c4f

  • SHA256

    a7a903cc8e78b96b4a5f219939b30032dbbf4a20878cffab70db7c9b30e2866d

  • SHA512

    31715bab29e33e11b73c1e989385067e84b322721b471b26092d9ae0127574758e39f34527c35119ef315eb787a75819aa06d8ed09484c5fff8bc74be7f01245

  • SSDEEP

    3072:14+j6rwxxCOyNv+xpYNl2O6Piq6L6M/9fVlO7:14+jX7byNv+xp88ninWM/9fVlO7

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

BOT

Targets

    • Target

      d11efc2ba3578e6a146a0f10774ad285

    • Size

      109KB

    • MD5

      d11efc2ba3578e6a146a0f10774ad285

    • SHA1

      e3352f49e4aa5b07c1ecce3b7d9f567ba2e96c4f

    • SHA256

      a7a903cc8e78b96b4a5f219939b30032dbbf4a20878cffab70db7c9b30e2866d

    • SHA512

      31715bab29e33e11b73c1e989385067e84b322721b471b26092d9ae0127574758e39f34527c35119ef315eb787a75819aa06d8ed09484c5fff8bc74be7f01245

    • SSDEEP

      3072:14+j6rwxxCOyNv+xpYNl2O6Piq6L6M/9fVlO7:14+jX7byNv+xp88ninWM/9fVlO7

    Score
    9/10
    • Contacts a large (53973) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

MITRE ATT&CK Matrix ATT&CK v13

Tasks