General

  • Target

    143e65a125e9aadbbe352773c24d049adb07c9ec1c9151f70f0dfc53131f860a.elf

  • Size

    146KB

  • Sample

    240707-bdlm6aygqk

  • MD5

    dcb0dc8287e78f2bda47f5b19b1f08ac

  • SHA1

    1bfcaeb52e8f333393b80133a7a247c9e65d02cc

  • SHA256

    143e65a125e9aadbbe352773c24d049adb07c9ec1c9151f70f0dfc53131f860a

  • SHA512

    6ab05e769159cce065fc0faab2bdf5316376d7c8b703beef4809939a6349dae2e65a29f14c95fdd34c5f40b312a191a2a7e3a72af772af443afc023118f8c367

  • SSDEEP

    3072:d4p2xNQux8uSA1rf1qQ4xG1+q6A1WSo8physp:d4cjr1DEQ4xu+q63SRhyO

Score
10/10

Malware Config

Extracted

Family

mirai

C2

botnet.4gnekoland.top

Targets

    • Target

      143e65a125e9aadbbe352773c24d049adb07c9ec1c9151f70f0dfc53131f860a.elf

    • Size

      146KB

    • MD5

      dcb0dc8287e78f2bda47f5b19b1f08ac

    • SHA1

      1bfcaeb52e8f333393b80133a7a247c9e65d02cc

    • SHA256

      143e65a125e9aadbbe352773c24d049adb07c9ec1c9151f70f0dfc53131f860a

    • SHA512

      6ab05e769159cce065fc0faab2bdf5316376d7c8b703beef4809939a6349dae2e65a29f14c95fdd34c5f40b312a191a2a7e3a72af772af443afc023118f8c367

    • SSDEEP

      3072:d4p2xNQux8uSA1rf1qQ4xG1+q6A1WSo8physp:d4cjr1DEQ4xu+q63SRhyO

    Score
    9/10
    • Contacts a large (81438) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Matrix ATT&CK v13

Tasks