General

  • Target

    0050c722e4d0fab41a619b6f820dab9c.elf

  • Size

    53KB

  • Sample

    240110-3cjkysabdk

  • MD5

    0050c722e4d0fab41a619b6f820dab9c

  • SHA1

    45fad51a49d25a309e5d70e6b9c6548ee8c4b3a0

  • SHA256

    663612d085e1720a68b9859324d90c179087b282d52bc6011c2c0556a03ea817

  • SHA512

    d6bd8b29bc6b4570b7240bc6e221adb6465cd2d1e0b0a312547dbbb0e6c36587c173a6cc3e1ce1a9f988008cea954de21c4c0f5bba43685a1c7234572bdf5e86

  • SSDEEP

    1536:VJCqjbwNRaPq5FllaxwOzvT+Toao9Mkv:FjEraP4llaxwIT+T3mMk

Malware Config

Extracted

Family

mirai

Botnet

BOTNET

C2

cnc7.cremeonu.online

Targets

    • Target

      0050c722e4d0fab41a619b6f820dab9c.elf

    • Size

      53KB

    • MD5

      0050c722e4d0fab41a619b6f820dab9c

    • SHA1

      45fad51a49d25a309e5d70e6b9c6548ee8c4b3a0

    • SHA256

      663612d085e1720a68b9859324d90c179087b282d52bc6011c2c0556a03ea817

    • SHA512

      d6bd8b29bc6b4570b7240bc6e221adb6465cd2d1e0b0a312547dbbb0e6c36587c173a6cc3e1ce1a9f988008cea954de21c4c0f5bba43685a1c7234572bdf5e86

    • SSDEEP

      1536:VJCqjbwNRaPq5FllaxwOzvT+Toao9Mkv:FjEraP4llaxwIT+T3mMk

    Score
    9/10
    • Contacts a large (114878) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Changes its process name

    • Modifies Watchdog functionality

      Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v15

Tasks