General

  • Target

    huhu.x86.elf

  • Size

    98KB

  • Sample

    240223-tpmzgadh7v

  • MD5

    e923a0e20d2e9c6b63667b264a1c2a22

  • SHA1

    ba6f15ff2a3f6ee20ecf806925bfae97efd02756

  • SHA256

    7222a0dce5ac073f6f74e9e4ec353f27fd3e31eed138fd964d1588784974eed9

  • SHA512

    4134f222d287631264fb42d8ffee5905c7ca8c69b0b2ace242dbdb6208142e7129a8c929c618cd62aefa37789cdcc60445427f6db43089fca54408b06f005086

  • SSDEEP

    1536:Iobylwzk4Ad/7aDkgxunCJtfQkP7Iy6/Hj/L+HSOLZoYolcOCr1:3bylwzk4AUjxunMTPEH/Hz6yOqur1

Score
10/10

Malware Config

Extracted

Family

mirai

C2

haha.skyljne.click

Targets

    • Target

      huhu.x86.elf

    • Size

      98KB

    • MD5

      e923a0e20d2e9c6b63667b264a1c2a22

    • SHA1

      ba6f15ff2a3f6ee20ecf806925bfae97efd02756

    • SHA256

      7222a0dce5ac073f6f74e9e4ec353f27fd3e31eed138fd964d1588784974eed9

    • SHA512

      4134f222d287631264fb42d8ffee5905c7ca8c69b0b2ace242dbdb6208142e7129a8c929c618cd62aefa37789cdcc60445427f6db43089fca54408b06f005086

    • SSDEEP

      1536:Iobylwzk4Ad/7aDkgxunCJtfQkP7Iy6/Hj/L+HSOLZoYolcOCr1:3bylwzk4AUjxunMTPEH/Hz6yOqur1

    Score
    9/10
    • Contacts a large (80735) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Changes its process name

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v15

Tasks