General

  • Target

    7dca39066597a4dc093b6d31a65ae4e3.elf

  • Size

    45KB

  • Sample

    240418-yx89wseh4x

  • MD5

    7dca39066597a4dc093b6d31a65ae4e3

  • SHA1

    50a2113d43f547708893487b29e3cc1eef568ab0

  • SHA256

    7d34f68e05ff02c35610806b8138d2e2c3bd7a2168b2e9c4335af1c38a2ad6a4

  • SHA512

    ffcc149af4d1a19a6ebd97c1d7ef38f8082075dc7e73a292ff8face85778f3aa6f007da9d5ae7677056d76b894bca93d3ead0ad8e8a152da115bcf7b2b227f78

  • SSDEEP

    768:kFsCAjAHYeH0OVnC/I3JcXKcgVgQ9E27PVFrvFb+INmUaD4y8Bj/Ms3IU:kFsCAjAHFHNVnLZ+gV5W0D+INm9D4PLJ

Malware Config

Extracted

Family

mirai

Botnet

MIRAI

C2

client.orxy.space

Targets

    • Target

      7dca39066597a4dc093b6d31a65ae4e3.elf

    • Size

      45KB

    • MD5

      7dca39066597a4dc093b6d31a65ae4e3

    • SHA1

      50a2113d43f547708893487b29e3cc1eef568ab0

    • SHA256

      7d34f68e05ff02c35610806b8138d2e2c3bd7a2168b2e9c4335af1c38a2ad6a4

    • SHA512

      ffcc149af4d1a19a6ebd97c1d7ef38f8082075dc7e73a292ff8face85778f3aa6f007da9d5ae7677056d76b894bca93d3ead0ad8e8a152da115bcf7b2b227f78

    • SSDEEP

      768:kFsCAjAHYeH0OVnC/I3JcXKcgVgQ9E27PVFrvFb+INmUaD4y8Bj/Ms3IU:kFsCAjAHFHNVnLZ+gV5W0D+INm9D4PLJ

    Score
    9/10
    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Changes its process name

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

MITRE ATT&CK Enterprise v15

Tasks