Malware Analysis Report

2025-03-15 01:50

Sample ID 240418-ccqfdsga67
Target cba079fbaa1ebedbb75d9c0dc4e013c63c7ff0a62aac7dde7cb605a4324b5d56.elf
SHA256 cba079fbaa1ebedbb75d9c0dc4e013c63c7ff0a62aac7dde7cb605a4324b5d56
Tags
botnet mirai
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

cba079fbaa1ebedbb75d9c0dc4e013c63c7ff0a62aac7dde7cb605a4324b5d56

Threat Level: Known bad

The file cba079fbaa1ebedbb75d9c0dc4e013c63c7ff0a62aac7dde7cb605a4324b5d56.elf was found to be: Known bad.

Malicious Activity Summary

botnet mirai

Mirai family

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2024-04-18 01:56

Signatures

Mirai family

mirai

Analysis: behavioral1

Detonation Overview

Submitted

2024-04-18 01:56

Reported

2024-04-18 01:58

Platform

debian12-armhf-20240221-en

Max time network

148s

Command Line

N/A

Signatures

N/A

Processes

N/A

Network

Country Destination Domain Proto
US 8.8.8.8:53 kovey.mezo-api.xyz udp
US 8.8.8.8:53 udp
US 8.8.8.8:53 udp
US 8.8.8.8:53 udp
US 8.8.8.8:53 udp
US 8.8.8.8:53 udp
DE 45.131.111.219:33966 kovey.mezo-api.xyz tcp
US 1.1.1.1:53 debian12-armhf-20240221-en-5 udp
US 1.1.1.1:53 debian12-armhf-20240221-en-5 udp
US 1.1.1.1:53 debian12-armhf-20240221-en-5 udp
US 1.1.1.1:53 debian12-armhf-20240221-en-5 udp
US 8.8.8.8:53 udp
US 8.8.8.8:53 udp
US 8.8.8.8:53 udp
US 8.8.8.8:53 udp
US 8.8.8.8:53 udp
US 8.8.8.8:53 udp
US 8.8.8.8:53 udp
US 8.8.8.8:53 udp
US 8.8.8.8:53 udp
US 8.8.8.8:53 udp
DE 45.131.111.219:33966 kovey.mezo-api.xyz tcp

Files

N/A