General

  • Target

    93cdaf2930d92b5f7e40301559f77f0a.elf

  • Size

    82KB

  • Sample

    240403-hn8n1aac4y

  • MD5

    93cdaf2930d92b5f7e40301559f77f0a

  • SHA1

    c67bb0187d3d8bfa3dbc3e11f025a79137676b6f

  • SHA256

    efea868c65baab2a7c8cbbefee3b3b3786c61b0c53a95c46f763384c29e6ce4c

  • SHA512

    046a5d604cc59d62fc55ecfbe66a0b02135285387590e79a683810b931d52706f0841d82b1377d711cd2093488a41610355700bbb701fb6d4d688c4aae0e38f8

  • SSDEEP

    1536:iVLymx1K28kj752dCexuV/8UZlDwfkJ4MYfW0:iVLyIU8Fezxu5VD1eN

Score
10/10

Malware Config

Extracted

Family

mirai

C2

botnet.618389.com

Targets

    • Target

      93cdaf2930d92b5f7e40301559f77f0a.elf

    • Size

      82KB

    • MD5

      93cdaf2930d92b5f7e40301559f77f0a

    • SHA1

      c67bb0187d3d8bfa3dbc3e11f025a79137676b6f

    • SHA256

      efea868c65baab2a7c8cbbefee3b3b3786c61b0c53a95c46f763384c29e6ce4c

    • SHA512

      046a5d604cc59d62fc55ecfbe66a0b02135285387590e79a683810b931d52706f0841d82b1377d711cd2093488a41610355700bbb701fb6d4d688c4aae0e38f8

    • SSDEEP

      1536:iVLymx1K28kj752dCexuV/8UZlDwfkJ4MYfW0:iVLyIU8Fezxu5VD1eN

    Score
    9/10
    • Contacts a large (35066) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Changes its process name

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Matrix ATT&CK v13

Tasks