General

  • Target

    x86_32

  • Size

    100KB

  • Sample

    240424-xz7cmsfh22

  • MD5

    f52ac51a1924f1b04661b0bf1a5aa545

  • SHA1

    18df6df4fd93c87974f227e23f13dcc87b7ef3b8

  • SHA256

    08b72566507c0e07d6c3b6091b7de57b714eb0ac8404a93b1e830f7f8f5f5977

  • SHA512

    5298a765cfd9663c7aca5ad7f5f046ae6331509a117b53d1265a14c19731ac6a012236234e00c77fffeff6c0ef27e931e1f88b79ee5dcdfb52d9734304295751

  • SSDEEP

    1536:fykodiwJrj3LD2IYNjQ5ZyItGo8YSP7aUwIq1y7YuczGI:fGdiKrbLL5ZGoBIq1KVFI

Malware Config

Extracted

Family

mirai

Botnet

MIRAI

C2

client.orxy.space

Targets

    • Target

      x86_32

    • Size

      100KB

    • MD5

      f52ac51a1924f1b04661b0bf1a5aa545

    • SHA1

      18df6df4fd93c87974f227e23f13dcc87b7ef3b8

    • SHA256

      08b72566507c0e07d6c3b6091b7de57b714eb0ac8404a93b1e830f7f8f5f5977

    • SHA512

      5298a765cfd9663c7aca5ad7f5f046ae6331509a117b53d1265a14c19731ac6a012236234e00c77fffeff6c0ef27e931e1f88b79ee5dcdfb52d9734304295751

    • SSDEEP

      1536:fykodiwJrj3LD2IYNjQ5ZyItGo8YSP7aUwIq1y7YuczGI:fGdiKrbLL5ZGoBIq1KVFI

    Score
    9/10
    • Contacts a large (16789) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Matrix ATT&CK v13

Tasks