General

  • Target

    skyljne.x86.elf

  • Size

    100KB

  • Sample

    240114-r4qb2acef9

  • MD5

    2357668b7c737cf603987f04c89b61b2

  • SHA1

    53cba284d060b97b7db31be433d238fd715f72a3

  • SHA256

    b0afcbfd840a393d2e7f4d630986ebc74cdce549aac0cca687e35296cec62ee3

  • SHA512

    3fb4970452b3572439f5dd3b7b5a5701ace7547b3c8a6435015de49cf1dab02ce9f9d82f6e90da69d34597f7780dfc385d330615419bdb6512566de7b0db017a

  • SSDEEP

    3072:0S1GIt7wDRKt2+YrhVJtcbbO/njYoYMV:0oBcDRjk2nrrV

Score
10/10

Malware Config

Extracted

Family

mirai

C2

haha.skyljne.click

Targets

    • Target

      skyljne.x86.elf

    • Size

      100KB

    • MD5

      2357668b7c737cf603987f04c89b61b2

    • SHA1

      53cba284d060b97b7db31be433d238fd715f72a3

    • SHA256

      b0afcbfd840a393d2e7f4d630986ebc74cdce549aac0cca687e35296cec62ee3

    • SHA512

      3fb4970452b3572439f5dd3b7b5a5701ace7547b3c8a6435015de49cf1dab02ce9f9d82f6e90da69d34597f7780dfc385d330615419bdb6512566de7b0db017a

    • SSDEEP

      3072:0S1GIt7wDRKt2+YrhVJtcbbO/njYoYMV:0oBcDRjk2nrrV

    Score
    9/10
    • Contacts a large (128447) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Changes its process name

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v15

Tasks