General

  • Target

    cb67b3d6475f64cfae54e4f427bbfdad.elf

  • Size

    108KB

  • Sample

    240422-l99d7sac9s

  • MD5

    cb67b3d6475f64cfae54e4f427bbfdad

  • SHA1

    06265af0f387db138cff98d44db80df0bfdb7f3f

  • SHA256

    e62b41c5ea3c57dcdbcefb257f476331ae50ed1560b6d161cfac46e7219d75a2

  • SHA512

    bd4a55d3728598586f6980c7cd4664074e54e1da48301aa29b01466b88802b1116fcf531cea158a217fc3b64fb8090104763c765066843bb7575292324dc6026

  • SSDEEP

    1536:yG1wjLjW5/kAKgFtgGwKS02TPJcoPRiuauEMA7DHEvNqedlf/nloHwbO:yGKjfytgGwUCJcyRi77DCNNnloQa

Malware Config

Extracted

Family

mirai

Botnet

UNSTABLE

Targets

    • Target

      cb67b3d6475f64cfae54e4f427bbfdad.elf

    • Size

      108KB

    • MD5

      cb67b3d6475f64cfae54e4f427bbfdad

    • SHA1

      06265af0f387db138cff98d44db80df0bfdb7f3f

    • SHA256

      e62b41c5ea3c57dcdbcefb257f476331ae50ed1560b6d161cfac46e7219d75a2

    • SHA512

      bd4a55d3728598586f6980c7cd4664074e54e1da48301aa29b01466b88802b1116fcf531cea158a217fc3b64fb8090104763c765066843bb7575292324dc6026

    • SSDEEP

      1536:yG1wjLjW5/kAKgFtgGwKS02TPJcoPRiuauEMA7DHEvNqedlf/nloHwbO:yGKjfytgGwUCJcyRi77DCNNnloQa

    Score
    9/10
    • Contacts a large (37106) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Enumerates active TCP sockets

      Gets active TCP sockets from /proc virtual filesystem.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Network Service Discovery

2
T1046

System Network Connections Discovery

1
T1049

System Network Configuration Discovery

1
T1016

Tasks