General

  • Target

    89d2011fff1535f1811d61657ea0820c.bin

  • Size

    32KB

  • Sample

    240630-c88a3swejk

  • MD5

    0a87740cf7228991bb8cd945f4243bd9

  • SHA1

    adf0804876d9a5e7404ed1c6a706eb0e3de32c51

  • SHA256

    0d6fc049416c36091ed15beb22414e05b3357bd7d59814d6924e8c150b5d42f5

  • SHA512

    a7225db937a436a0fe24d92e788b0177fff1116ecc26ab54d567cb7077d260524cf737eac1b7719fb3f78b6f0177500827122049b8510d2235d551b78f62f0da

  • SSDEEP

    768:u8+8XuX4nGjp5PczPacViyGkUkpA99uMxvNZpQq:bH9kpiO7ymkI91zZCq

Malware Config

Extracted

Family

mirai

Botnet

MIRAI

Targets

    • Target

      7e05474890a7478e1623b219c73d6b1dad09cc3960c0001ed71587234c7768e9.elf

    • Size

      60KB

    • MD5

      89d2011fff1535f1811d61657ea0820c

    • SHA1

      782b7871ec3758b0fccd720b2fc7f155d3a2cddc

    • SHA256

      7e05474890a7478e1623b219c73d6b1dad09cc3960c0001ed71587234c7768e9

    • SHA512

      9fcf76b88ab0da9c42e23fff5592e2e5527bb60c6d6cd02f6e000460ecfce0c5938080b61c732d757e9dea83c2a35e5681628fd983a45afa04aabf769316be6f

    • SSDEEP

      768:BD4fWkmkexEb2thXQ9MnK+jbiL5CtKY1RlgF36OvJVHbHzDMK:Bfmb2thXQ9MKYy5FmlmL7T

    Score
    9/10
    • Contacts a large (8797) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Loads a kernel module

      Loads a Linux kernel module, potentially to achieve persistence

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

MITRE ATT&CK Enterprise v15

Tasks