General

  • Target

    huhu.arm.elf

  • Size

    142KB

  • Sample

    240129-grflysbfa8

  • MD5

    bd0288bb7c4b34902c98b5b700ccdca1

  • SHA1

    5c98873909c1ce2dfddd59ced5b1ce1f4c26e403

  • SHA256

    f8001abcfa86a36ccf6e7d971183513f9226c8b5e19ed35d72242df08b337a91

  • SHA512

    a03a0273fdf949919b4b6f3a6e260f949e452c5f37ba34e917c9b1391ef9bf140268e29c6064e4105e44bebc5f00a7c8a106dc1a26447a6bc3f8065a8ac55888

  • SSDEEP

    3072:S0Wwjt3TFP+qMFage4CSh339IsnEnMNXJNxA:S0dp5KEh4CW339eMNXJNO

Score
10/10

Malware Config

Extracted

Family

mirai

C2

haha.skyljne.click

Targets

    • Target

      huhu.arm.elf

    • Size

      142KB

    • MD5

      bd0288bb7c4b34902c98b5b700ccdca1

    • SHA1

      5c98873909c1ce2dfddd59ced5b1ce1f4c26e403

    • SHA256

      f8001abcfa86a36ccf6e7d971183513f9226c8b5e19ed35d72242df08b337a91

    • SHA512

      a03a0273fdf949919b4b6f3a6e260f949e452c5f37ba34e917c9b1391ef9bf140268e29c6064e4105e44bebc5f00a7c8a106dc1a26447a6bc3f8065a8ac55888

    • SSDEEP

      3072:S0Wwjt3TFP+qMFage4CSh339IsnEnMNXJNxA:S0dp5KEh4CW339eMNXJNO

    Score
    9/10
    • Contacts a large (116096) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Changes its process name

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v15

Tasks