Malware Analysis Report

2024-11-15 05:16

Sample ID 240419-bzgakaea4x
Target 7d34f68e05ff02c35610806b8138d2e2c3bd7a2168b2e9c4335af1c38a2ad6a4.elf
SHA256 7d34f68e05ff02c35610806b8138d2e2c3bd7a2168b2e9c4335af1c38a2ad6a4
Tags
mirai mirai
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

7d34f68e05ff02c35610806b8138d2e2c3bd7a2168b2e9c4335af1c38a2ad6a4

Threat Level: Known bad

The file 7d34f68e05ff02c35610806b8138d2e2c3bd7a2168b2e9c4335af1c38a2ad6a4.elf was found to be: Known bad.

Malicious Activity Summary

mirai mirai

Mirai family

Changes its process name

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2024-04-19 01:34

Signatures

Mirai family

mirai

Analysis: behavioral1

Detonation Overview

Submitted

2024-04-19 01:34

Reported

2024-04-19 01:37

Platform

ubuntu1804-amd64-20240226-en

Max time kernel

132s

Max time network

147s

Command Line

[/tmp/7d34f68e05ff02c35610806b8138d2e2c3bd7a2168b2e9c4335af1c38a2ad6a4.elf]

Signatures

Changes its process name

Description Indicator Process Target
Changes the process name, possibly in an attempt to hide itself a /tmp/7d34f68e05ff02c35610806b8138d2e2c3bd7a2168b2e9c4335af1c38a2ad6a4.elf N/A

Processes

/tmp/7d34f68e05ff02c35610806b8138d2e2c3bd7a2168b2e9c4335af1c38a2ad6a4.elf

[/tmp/7d34f68e05ff02c35610806b8138d2e2c3bd7a2168b2e9c4335af1c38a2ad6a4.elf]

Network

Country Destination Domain Proto
DE 185.117.3.184:3589 tcp
N/A 224.0.0.251:5353 udp
US 151.101.130.49:443 tcp
US 151.101.65.91:443 tcp
GB 195.181.164.14:443 tcp
GB 185.125.188.62:443 tcp
GB 185.125.188.61:443 tcp
DE 185.117.3.184:3589 tcp
DE 185.117.3.184:3589 tcp

Files

N/A