General

  • Target

    6d9abc8855a7d0fd3cb8fa5668413877.bin

  • Size

    39KB

  • Sample

    240623-ctkapszdkq

  • MD5

    617d5c9fdaaa37b219c9a06ed8883d03

  • SHA1

    2ead24d3cf504498504f4555245c7d33481acf63

  • SHA256

    9971dbfca379f917d6ae13445f5e3df8ac15c95c6a95087c218048c5b61dded7

  • SHA512

    45159411540b5d5482f5bb4be70c5bc9ccebc54f335939e4cf967d7cfd1aaa7a14001ba452db728ce8aa3a061be5329af358db93204af85beec7e2d044653e89

  • SSDEEP

    768:+jHTZz4vM1GBinL4Z1EaplLXurIQA3yWWEVlhMBSJ4OY2qmbJM+imsAAdnR0F:y14U1Lqa8bFVT9MBSJ4OumbJMEAQF

Malware Config

Extracted

Family

mirai

Botnet

MIRAI

Targets

    • Target

      e579c6ffe65cfb69d81a9e98e2a7b0a94feecc401883c257b04dd957c128ba21.elf

    • Size

      76KB

    • MD5

      6d9abc8855a7d0fd3cb8fa5668413877

    • SHA1

      c31e041d651db8032adbc2ac27e938ebb7bae6ef

    • SHA256

      e579c6ffe65cfb69d81a9e98e2a7b0a94feecc401883c257b04dd957c128ba21

    • SHA512

      94773d8a3aac80cd4ad77d272b80db6a344e577f5828a144dbb75847e27c686a31eb5b9584734b43a30a7048c8802953b044ba68848fc12f2dd662e7feb584a5

    • SSDEEP

      1536:S4Vxmlp7eJ2Ff/cBGBLNPcYhd3Pc3mAj9r77a3BUKd1ZA61xaLo8OX5FwbZnx:S4ilp7qA3KsL/d3E3j937uU6ZA5Lo8OQ

    Score
    9/10
    • Contacts a large (23993) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

MITRE ATT&CK Matrix ATT&CK v13

Tasks