General

  • Target

    a2dea167aa9b33e6fb601ac55c6f8bc0.bin

  • Size

    70KB

  • Sample

    240403-bzw11scb84

  • MD5

    02b7d4f1211c8f565a29e29dd7bd199e

  • SHA1

    56f6a3571518ca5883f29e5c09cea1080eade08b

  • SHA256

    9fc72a2fbd1ba32475760cc60a1dc81bb8be747ba9e408f975acf54ccfe509d7

  • SHA512

    995a33614f733ce51846a8a1e088a8d0c976e45fd442a47e6ee97e6e2a97d48305ab504279945fed60d3859b49a3ce9156d8d73bd953860947df5ca0cf2b45a3

  • SSDEEP

    1536:8zoMYidCe5GS8ezQnP9LkBaVXX9oKvSI+E2Pjq5mhFJkT+XLkLa1:8ggCwBSXDaDEx7SkLO

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

MIRAI

Targets

    • Target

      fca1c84d387959435ca272cd08a56301b08610279a787efa38f1d023dad28119.elf

    • Size

      157KB

    • MD5

      a2dea167aa9b33e6fb601ac55c6f8bc0

    • SHA1

      c59bf88b2b0078baec4bf4de1b867f5f2bd83009

    • SHA256

      fca1c84d387959435ca272cd08a56301b08610279a787efa38f1d023dad28119

    • SHA512

      383a38d45458b5e4ab2850a273b0c3810b7580b3133f52664b1ec1d9dddf06740c46170154677ecdc83c4d49a16972f2da9dddc216dca7840bb7f9575af6bf84

    • SSDEEP

      3072:nv66zeDyxRyCfaoeZh5unJooELSWabmOwvWvviM/99xodwx:nvbzv3jfaoeZh5gJqS/KlvWvKM/9zodQ

    Score
    7/10
    • Changes its process name

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Matrix

Tasks