General

  • Target

    7dca39066597a4dc093b6d31a65ae4e3.bin

  • Size

    25KB

  • Sample

    240420-bqn9tade8z

  • MD5

    0168a4fe27e04929f787da3287237964

  • SHA1

    79f7cf5055df6d9c9eb05ef90bb952922892407e

  • SHA256

    8f63132a7bd73c75783ab31fa9290756043b3ddd60ec30488ceaa19d7f9aee54

  • SHA512

    4f3781e65da77babef399e19ccf6d0e3e5677021b82e69e6ea6d580e44a8d8f5ba275cbb4f1a502d075c79ca1f664a959f6a7bae90d79078a010f5c44a8415f1

  • SSDEEP

    384:cFrXhEHMnOEsiGRh0fwTcuJiENudGO1pkxDLQu+RhuyGvfvSW2RNN7wbjwzmqBuv:cFj+HG0hIwouGpkxHQNPzRHrzd2Zl

Malware Config

Extracted

Family

mirai

Botnet

MIRAI

C2

client.orxy.space

Targets

    • Target

      7d34f68e05ff02c35610806b8138d2e2c3bd7a2168b2e9c4335af1c38a2ad6a4.elf

    • Size

      45KB

    • MD5

      7dca39066597a4dc093b6d31a65ae4e3

    • SHA1

      50a2113d43f547708893487b29e3cc1eef568ab0

    • SHA256

      7d34f68e05ff02c35610806b8138d2e2c3bd7a2168b2e9c4335af1c38a2ad6a4

    • SHA512

      ffcc149af4d1a19a6ebd97c1d7ef38f8082075dc7e73a292ff8face85778f3aa6f007da9d5ae7677056d76b894bca93d3ead0ad8e8a152da115bcf7b2b227f78

    • SSDEEP

      768:kFsCAjAHYeH0OVnC/I3JcXKcgVgQ9E27PVFrvFb+INmUaD4y8Bj/Ms3IU:kFsCAjAHFHNVnLZ+gV5W0D+INm9D4PLJ

    Score
    9/10
    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

MITRE ATT&CK Enterprise v15

Tasks