General

  • Target

    726aa14431a4fb7873e683493102c01601d462fb1fbce71767b6a97f0897bb28.elf

  • Size

    150KB

  • Sample

    240707-bj74cazamm

  • MD5

    d483630fac747cc0d965d82ff47b1302

  • SHA1

    3f7692c377c465b3f0997b97539b1306ca6fb2a2

  • SHA256

    726aa14431a4fb7873e683493102c01601d462fb1fbce71767b6a97f0897bb28

  • SHA512

    8d3a556390a043755fa722933ef3fe432934415df1bfcd88528bd6f07b4cecb419ef414895c612dd0fe7b262968c149a9a3571cebb9e89c73c9893222c6f5e3f

  • SSDEEP

    3072:UgwtPutmOWv2Z2tWFrCs84m3nmfT8QUHHuaHsQ:Ug1yC2Qto4mWfT8xHuaHj

Score
10/10

Malware Config

Extracted

Family

mirai

C2

botnet.4gnekoland.top

Targets

    • Target

      726aa14431a4fb7873e683493102c01601d462fb1fbce71767b6a97f0897bb28.elf

    • Size

      150KB

    • MD5

      d483630fac747cc0d965d82ff47b1302

    • SHA1

      3f7692c377c465b3f0997b97539b1306ca6fb2a2

    • SHA256

      726aa14431a4fb7873e683493102c01601d462fb1fbce71767b6a97f0897bb28

    • SHA512

      8d3a556390a043755fa722933ef3fe432934415df1bfcd88528bd6f07b4cecb419ef414895c612dd0fe7b262968c149a9a3571cebb9e89c73c9893222c6f5e3f

    • SSDEEP

      3072:UgwtPutmOWv2Z2tWFrCs84m3nmfT8QUHHuaHsQ:Ug1yC2Qto4mWfT8xHuaHj

    Score
    9/10
    • Contacts a large (49089) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Matrix ATT&CK v13

Tasks