General

  • Target

    439ed3699b1bea25f2d22162e1769cc5d356885ae8a53e4377d3c725b53aad7c.elf

  • Size

    139KB

  • Sample

    240428-bnzb1adb5x

  • MD5

    87cfe9e3a0b06bf2e4f2b1310e6594ee

  • SHA1

    b54fb26f71365d6863af8c945f80fb9a41ac6ed5

  • SHA256

    439ed3699b1bea25f2d22162e1769cc5d356885ae8a53e4377d3c725b53aad7c

  • SHA512

    de66bfe5a0b847c7175855fcbc29dee9f21801f3b07335d98c020ba76095c1d230c5a8a344c6d4d23f326deb9aaca3afdb62d59ab42e16e8797a588835b09bd9

  • SSDEEP

    3072:QybUEGniGQYtOR7aCgk9mrsplDKZUmQBKXAVanJX+F8Jyve4hL5AJI4+3jJNx13y:DbUEGniGQYtOR7aPk9mrsplDKZUmQBKB

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Targets

    • Target

      439ed3699b1bea25f2d22162e1769cc5d356885ae8a53e4377d3c725b53aad7c.elf

    • Size

      139KB

    • MD5

      87cfe9e3a0b06bf2e4f2b1310e6594ee

    • SHA1

      b54fb26f71365d6863af8c945f80fb9a41ac6ed5

    • SHA256

      439ed3699b1bea25f2d22162e1769cc5d356885ae8a53e4377d3c725b53aad7c

    • SHA512

      de66bfe5a0b847c7175855fcbc29dee9f21801f3b07335d98c020ba76095c1d230c5a8a344c6d4d23f326deb9aaca3afdb62d59ab42e16e8797a588835b09bd9

    • SSDEEP

      3072:QybUEGniGQYtOR7aCgk9mrsplDKZUmQBKXAVanJX+F8Jyve4hL5AJI4+3jJNx13y:DbUEGniGQYtOR7aPk9mrsplDKZUmQBKB

    Score
    9/10
    • Contacts a large (20483) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

MITRE ATT&CK Matrix ATT&CK v13

Tasks