General

  • Target

    cac818d10db4e5bb13059d345e8184e1.elf

  • Size

    57KB

  • Sample

    240225-v9en9sab4w

  • MD5

    cac818d10db4e5bb13059d345e8184e1

  • SHA1

    4aa4ced9bf12119c6adc243a88e1191f075c858e

  • SHA256

    a70396655a66435c4194e86d22961c8ea9272715dde970350b1bd34fe38d9bf9

  • SHA512

    eadf06a6490cb9e25acf873cbe411f15e3853cbc7191bb96de5d08730fc6c71e3abcd48920d21bc725d54976b6f56d0995ff0c84d6c2b3fc3bdf9c2dc864b8f4

  • SSDEEP

    1536:I6MRt6IhtHwNZSexcnutcyWhKd4ekA1/uxJK:vMRt5htQNZSexcutOwdnkAVu7K

Score
10/10

Malware Config

Extracted

Family

mirai

C2

wwv.bmjz.vip

mnmn.espontaneo.cc

Targets

    • Target

      cac818d10db4e5bb13059d345e8184e1.elf

    • Size

      57KB

    • MD5

      cac818d10db4e5bb13059d345e8184e1

    • SHA1

      4aa4ced9bf12119c6adc243a88e1191f075c858e

    • SHA256

      a70396655a66435c4194e86d22961c8ea9272715dde970350b1bd34fe38d9bf9

    • SHA512

      eadf06a6490cb9e25acf873cbe411f15e3853cbc7191bb96de5d08730fc6c71e3abcd48920d21bc725d54976b6f56d0995ff0c84d6c2b3fc3bdf9c2dc864b8f4

    • SSDEEP

      1536:I6MRt6IhtHwNZSexcnutcyWhKd4ekA1/uxJK:vMRt5htQNZSexcutOwdnkAVu7K

    Score
    7/10
    • Changes its process name

    • Deletes itself

    • Renames itself

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Matrix

Tasks