General

  • Target

    e6e3841f3099a9be985a5116943e54e2.bin

  • Size

    39KB

  • Sample

    240403-cdg6eace6w

  • MD5

    6647a38166a2763cdf2088c3434863d0

  • SHA1

    7c7524442cdace6b521f38a4eb27fd3c4a50dc09

  • SHA256

    594e657073f20c096fed8455aa6974045f28349b4c5b6d78faf30cd9a547d85b

  • SHA512

    1670aac3d024d03d28c4f9d78fc57684a5fa922f5b714940a078939d4c1410aafba6a62bee30d20d2a83f3e7149e1e4b9741d628eaeca5747c2144fbb5835f47

  • SSDEEP

    768:IlHHQKWxboHgUkk0O5jTmO+m0T/3rHaMoZa4lQCccsdCNcG1XHWe6:Q7WxbotkXO5fbKT/AZabC/Gt

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

MIRAI

Targets

    • Target

      d5a372d3a991f01ec9b1deb385bed8eaaf63cdd637920abff57d0b115a36113b.elf

    • Size

      73KB

    • MD5

      e6e3841f3099a9be985a5116943e54e2

    • SHA1

      2a28d8c44ae220f2ed06d5424ede0563d0881306

    • SHA256

      d5a372d3a991f01ec9b1deb385bed8eaaf63cdd637920abff57d0b115a36113b

    • SHA512

      ae40f556d8ce77c691d0f8198e1b14b646e731962ad869e304b119ad68eb470c7979f4b8f392b445090a43f9c318d8547db563a05c79b94a02a0d6059d1ed845

    • SSDEEP

      1536:WRBH0hPAjrk578GnUFRpFvdG9gp1l+OSDhconOOQW:WRiRBUFRpddGSp1iAOn

    Score
    7/10
    • Changes its process name

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Matrix

Tasks