General

  • Target

    f586d89317ac83e0638b26e561c571d4.elf

  • Size

    130KB

  • Sample

    240225-j4zlpsgb9y

  • MD5

    f586d89317ac83e0638b26e561c571d4

  • SHA1

    d541ddf5f43102b1bb59e1f22e1d05d7902dc843

  • SHA256

    90f5914480d57f432e186a6ac3f6ae0a41ade19bd1635f9036a57d91b1b41225

  • SHA512

    88bbda82eca61a942c17e367bae1c0d5289bbaf45145c6f259ea224d2e9d2dfc73ce4171d195c7cbe78a4254b335c2b157ed75167c4cfc020079cfda29116a79

  • SSDEEP

    3072:gHZ+XDAoUxFOV48wlPtjsRraPuk81mOw9LG0ibF:gHZUAHAV48MPtjuI9q0i5

Score
10/10

Malware Config

Extracted

Family

mirai

C2

botnet.loadbalance.click

Targets

    • Target

      f586d89317ac83e0638b26e561c571d4.elf

    • Size

      130KB

    • MD5

      f586d89317ac83e0638b26e561c571d4

    • SHA1

      d541ddf5f43102b1bb59e1f22e1d05d7902dc843

    • SHA256

      90f5914480d57f432e186a6ac3f6ae0a41ade19bd1635f9036a57d91b1b41225

    • SHA512

      88bbda82eca61a942c17e367bae1c0d5289bbaf45145c6f259ea224d2e9d2dfc73ce4171d195c7cbe78a4254b335c2b157ed75167c4cfc020079cfda29116a79

    • SSDEEP

      3072:gHZ+XDAoUxFOV48wlPtjsRraPuk81mOw9LG0ibF:gHZUAHAV48MPtjuI9q0i5

    Score
    7/10
    • Changes its process name

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Matrix

Tasks