General

  • Target

    c5688a5e3eb1e6d99315a793253e6af8.elf

  • Size

    175KB

  • Sample

    240411-snfckahc7y

  • MD5

    c5688a5e3eb1e6d99315a793253e6af8

  • SHA1

    2e2580eb71010566bf7de18557d387475a92a811

  • SHA256

    ca584057e4bf81823ae1e97562dbca2dcdbbd813244a68de3fad80a187debe31

  • SHA512

    e1eaa0ce9528bd5c1761a293cc0c3e9a2d845ce1a6d0938afdbcfeeb3f5089b2e81c69a5390f2c0f4e6befa20c4823eb940f7835629f021ee6017948d4d8a0a3

  • SSDEEP

    3072:uk/uc6NbBLbcBCkoajwdyqkk4/T/6EBp0u/hJjogM/RkWT+M:uk/2BLbEloajwdybkwRBKu/XMgM/RkWL

Score
10/10

Malware Config

Extracted

Family

mirai

C2

botnet.paintmc.net

Targets

    • Target

      c5688a5e3eb1e6d99315a793253e6af8.elf

    • Size

      175KB

    • MD5

      c5688a5e3eb1e6d99315a793253e6af8

    • SHA1

      2e2580eb71010566bf7de18557d387475a92a811

    • SHA256

      ca584057e4bf81823ae1e97562dbca2dcdbbd813244a68de3fad80a187debe31

    • SHA512

      e1eaa0ce9528bd5c1761a293cc0c3e9a2d845ce1a6d0938afdbcfeeb3f5089b2e81c69a5390f2c0f4e6befa20c4823eb940f7835629f021ee6017948d4d8a0a3

    • SSDEEP

      3072:uk/uc6NbBLbcBCkoajwdyqkk4/T/6EBp0u/hJjogM/RkWT+M:uk/2BLbEloajwdybkwRBKu/XMgM/RkWL

    Score
    7/10
    • Changes its process name

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Matrix

Tasks