General

  • Target

    arm.elf

  • Size

    65KB

  • Sample

    240103-yktnnshebk

  • MD5

    4f04293cb1ea3db3de14e5856f8d24ca

  • SHA1

    64e3c593172c6d8563d5a55e92f3d4cc81cecc08

  • SHA256

    5ab1799f88ef9e58b4077c20bfea8711fe38691cc3b9470b7f99e7d21830573f

  • SHA512

    d80e5d4cb9fef270f0b2384e05bd19857b4d8f9eb6f8f7d7aa50f3764806396cc2a46908d537da15c65460cfe8f24cdb25f6278137b41289bf6cf0b2426e500e

  • SSDEEP

    1536:r6uroOLqNXzd+fJMJZJUFVgyouYmV3Z3QeoLvvFeY:r6MkdQTHgyocJJQvFe

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

UNSTABLE

Targets

    • Target

      arm.elf

    • Size

      65KB

    • MD5

      4f04293cb1ea3db3de14e5856f8d24ca

    • SHA1

      64e3c593172c6d8563d5a55e92f3d4cc81cecc08

    • SHA256

      5ab1799f88ef9e58b4077c20bfea8711fe38691cc3b9470b7f99e7d21830573f

    • SHA512

      d80e5d4cb9fef270f0b2384e05bd19857b4d8f9eb6f8f7d7aa50f3764806396cc2a46908d537da15c65460cfe8f24cdb25f6278137b41289bf6cf0b2426e500e

    • SSDEEP

      1536:r6uroOLqNXzd+fJMJZJUFVgyouYmV3Z3QeoLvvFeY:r6MkdQTHgyocJJQvFe

    Score
    7/10
    • Changes its process name

    • Deletes itself

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Matrix

Tasks