General

  • Target

    4ee6fc39c565289ba7659d15a3e773cb6ce8602e233ba29048a46f6c5cc8d156.elf

  • Size

    61KB

  • Sample

    240405-bm7lzsgg52

  • MD5

    931def4833a0dd417683fffdee7fc426

  • SHA1

    276f0d1628e5d81fde00839a6d82862d9f481bd8

  • SHA256

    4ee6fc39c565289ba7659d15a3e773cb6ce8602e233ba29048a46f6c5cc8d156

  • SHA512

    936a40197d1a92c21e3e3691243fad37075038420e4551cbb5bbe8ad77883a98de593a53d079e096e8ae8b90dc8c56d87f97a418bf99e8cc7991efb5b531ffa2

  • SSDEEP

    1536:aDlRfj6RN1yYzpkx6vJd6ASl+WRi5atkT1:aDlhjkTy+eUJIAmDRQT

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

MIRAI

C2

client.orxy.space

Targets

    • Target

      4ee6fc39c565289ba7659d15a3e773cb6ce8602e233ba29048a46f6c5cc8d156.elf

    • Size

      61KB

    • MD5

      931def4833a0dd417683fffdee7fc426

    • SHA1

      276f0d1628e5d81fde00839a6d82862d9f481bd8

    • SHA256

      4ee6fc39c565289ba7659d15a3e773cb6ce8602e233ba29048a46f6c5cc8d156

    • SHA512

      936a40197d1a92c21e3e3691243fad37075038420e4551cbb5bbe8ad77883a98de593a53d079e096e8ae8b90dc8c56d87f97a418bf99e8cc7991efb5b531ffa2

    • SSDEEP

      1536:aDlRfj6RN1yYzpkx6vJd6ASl+WRi5atkT1:aDlhjkTy+eUJIAmDRQT

    Score
    7/10
    • Changes its process name

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Matrix

Tasks