General

  • Target

    74409c5d5ca9b002c1a629596185b621.elf

  • Size

    54KB

  • Sample

    240219-hysersba97

  • MD5

    74409c5d5ca9b002c1a629596185b621

  • SHA1

    9cfac78d9e184e5bf1b8f401a8e4939d518ec754

  • SHA256

    0922fc68fb3d1cc0a39634a7c1670eaab1ba267bf71278758189c4c6a266b951

  • SHA512

    f0b3557b4c1ccad72ac88b1b9ef7f914b9132371ae6664a09dfac907bcb1b6c68edefd8e9a230c818bd10d54e7933513e649b3ea9f5ecc190c73f000a74d6e59

  • SSDEEP

    1536:JeESt/basV2rcZhG6ayN7PYHE9qpFzWOIaEjrqM2s:JeESt/basVTga7PYHEwp9tXESR

Score
10/10

Malware Config

Extracted

Family

mirai

C2

botnet.layer4.bf

Targets

    • Target

      74409c5d5ca9b002c1a629596185b621.elf

    • Size

      54KB

    • MD5

      74409c5d5ca9b002c1a629596185b621

    • SHA1

      9cfac78d9e184e5bf1b8f401a8e4939d518ec754

    • SHA256

      0922fc68fb3d1cc0a39634a7c1670eaab1ba267bf71278758189c4c6a266b951

    • SHA512

      f0b3557b4c1ccad72ac88b1b9ef7f914b9132371ae6664a09dfac907bcb1b6c68edefd8e9a230c818bd10d54e7933513e649b3ea9f5ecc190c73f000a74d6e59

    • SSDEEP

      1536:JeESt/basV2rcZhG6ayN7PYHE9qpFzWOIaEjrqM2s:JeESt/basVTga7PYHEwp9tXESR

    Score
    9/10
    • Contacts a large (37881) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Changes its process name

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v15

Tasks