Resubmissions

23-04-2024 13:32

240423-qta9pagf6s 10

07-09-2023 13:24

230907-qnpvwsaa66 10

07-09-2023 13:24

230907-qnfbfsaa63 10

07-09-2023 13:23

230907-qm7djsaa59 10

07-09-2023 12:26

230907-pmkn4she9z 10

General

  • Target

    Linux.Mirai.B.zip

  • Size

    178KB

  • Sample

    240423-qta9pagf6s

  • MD5

    23282f4301170e8ee3b157dcfaae6317

  • SHA1

    a70f312adc8777dfb6d8d64c280b3405b4f52717

  • SHA256

    b50681094c040883f3da8fe697bd3a9e35e62d1672f59d9f14e0db494f9d41c2

  • SHA512

    c35ae449b81564a23fc1148d3514c72dbb0bd2b0cd3faee10765c24f9255ad9f7576fe37c94ce20893a3022ea3c124e49e3e4c09ac9f44a78ae1ac6fd6ae0460

  • SSDEEP

    3072:IcefSi+fw324VkAIOnRmPttnei+2kKPvJujb/qbsLoVeuvRuXY2m:Iefw324VrB6yE5wSbsL1uqzm

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

SORA

Targets

    • Target

      03254e6240c35f7d787ca5175ffc36818185e62bdfc4d88d5b342451a747156d

    • Size

      175KB

    • MD5

      390f1382237b5a01dd46bf1404c223e7

    • SHA1

      28976d0de5260fcdc620240bbad78424addd6232

    • SHA256

      03254e6240c35f7d787ca5175ffc36818185e62bdfc4d88d5b342451a747156d

    • SHA512

      ea2104284eb5efceade8400c2b57a34758f7507b0de4745cfab88d0f4f91222bf1f3ff9ba72912f48d53c22d87dca0600f54817de048ffe41bad8552e33bf339

    • SSDEEP

      3072:yOCadKI8clvfc0rXCMf4ZaxOQy+Ejhk/5UMllWWOcNuM/9ad4xofaZRK0mGHdNi6:/CadKI8c+bxZaxOQy+ehlMlYWOcAM/91

    Score
    1/10
    • Target

      f60b29cfb7eab3aeb391f46e94d4d8efadde5498583a2f5c71bd8212d8ae92da

    • Size

      276KB

    • MD5

      9a6e4b8a6ba5b4f5a408919d2c169d92

    • SHA1

      9b8523cbf0f3af49dbb1680d53c8fc9b2782bcfc

    • SHA256

      f60b29cfb7eab3aeb391f46e94d4d8efadde5498583a2f5c71bd8212d8ae92da

    • SHA512

      d5fd2334772c18729790ec25b5e3c0ace6353aaa853f60d7e55b13f9b88f49e1dec294c303abc3877894ee8a492fdd1d6a0b951405f1f5a021280ff1c1800670

    • SSDEEP

      6144:XkYUAmEjloym0V80hkRocENCP0RnYtGSoBmb4d3PCBElKb/0FaiFsXWxATqtEvcM:XkYUAmEjloym0V80hkRo/NCP0RnYtGSj

    Score
    9/10
    • Contacts a large (26194) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

MITRE ATT&CK Matrix ATT&CK v13

Tasks