General

  • Target

    b70a3e0a007a775b4bb39f951e43ce0b094512e7cf3205e7d4bb40e5c3a6275b

  • Size

    142KB

  • Sample

    240306-k1jlrafe6s

  • MD5

    47d07e0e11c935e691b66565b3325cb5

  • SHA1

    cae2f1b1c9a82dc81c5effe5b25a5c1c671f6349

  • SHA256

    b70a3e0a007a775b4bb39f951e43ce0b094512e7cf3205e7d4bb40e5c3a6275b

  • SHA512

    03e6e12923b94779865845b4467823eb9d5bfc217773cb90b6635ea329d20d5d8036f1e7dd43e581eff1f4f529bf114d1debe24602c37b9e73a3f6ac8cc25426

  • SSDEEP

    3072:Dc+MKM8doPOpwc11ei4QkzTpxbNLiYT5UalRH9ZZ:Dc58PBXei4QKTrbJUalRdZZ

Score
10/10

Malware Config

Extracted

Family

mirai

C2

bngoc.skyljne.click

Targets

    • Target

      b70a3e0a007a775b4bb39f951e43ce0b094512e7cf3205e7d4bb40e5c3a6275b

    • Size

      142KB

    • MD5

      47d07e0e11c935e691b66565b3325cb5

    • SHA1

      cae2f1b1c9a82dc81c5effe5b25a5c1c671f6349

    • SHA256

      b70a3e0a007a775b4bb39f951e43ce0b094512e7cf3205e7d4bb40e5c3a6275b

    • SHA512

      03e6e12923b94779865845b4467823eb9d5bfc217773cb90b6635ea329d20d5d8036f1e7dd43e581eff1f4f529bf114d1debe24602c37b9e73a3f6ac8cc25426

    • SSDEEP

      3072:Dc+MKM8doPOpwc11ei4QkzTpxbNLiYT5UalRH9ZZ:Dc58PBXei4QKTrbJUalRdZZ

    Score
    9/10
    • Contacts a large (46370) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Changes its process name

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v15

Tasks