General

  • Target

    6a75a895731f82107fce9ab4ea68b48393cfc023541e416b99069f22c326cbe0.elf

  • Size

    66KB

  • Sample

    240212-dv9gnacd2x

  • MD5

    febc3c5e8a66df3dceb228a75b0af7cd

  • SHA1

    1be01008f1e782124870e38a6a9d301b23c756e5

  • SHA256

    6a75a895731f82107fce9ab4ea68b48393cfc023541e416b99069f22c326cbe0

  • SHA512

    51308676d4edda06c81725374d08386b7e1c41b01e6a2ce832de091e469bf59a6091f2450b4a39e13564febb8afdca19629d359f0e81ac62c64dcf0a2fd017b1

  • SSDEEP

    1536:oFCLfIlpZ2TFPjS31resR2ukW/6xyT49mFvqKPCe:oFCLAlpcTFPjQ1rcKixyTOIvTPZ

Malware Config

Extracted

Family

mirai

Botnet

BOTNET

C2

194.169.175.3

Targets

    • Target

      6a75a895731f82107fce9ab4ea68b48393cfc023541e416b99069f22c326cbe0.elf

    • Size

      66KB

    • MD5

      febc3c5e8a66df3dceb228a75b0af7cd

    • SHA1

      1be01008f1e782124870e38a6a9d301b23c756e5

    • SHA256

      6a75a895731f82107fce9ab4ea68b48393cfc023541e416b99069f22c326cbe0

    • SHA512

      51308676d4edda06c81725374d08386b7e1c41b01e6a2ce832de091e469bf59a6091f2450b4a39e13564febb8afdca19629d359f0e81ac62c64dcf0a2fd017b1

    • SSDEEP

      1536:oFCLfIlpZ2TFPjS31resR2ukW/6xyT49mFvqKPCe:oFCLAlpcTFPjQ1rcKixyTOIvTPZ

    Score
    9/10
    • Contacts a large (76769) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Changes its process name

    • Deletes itself

MITRE ATT&CK Enterprise v15

Tasks