General

  • Target

    d483630fac747cc0d965d82ff47b1302.bin

  • Size

    65KB

  • Sample

    240708-eljqbatdmh

  • MD5

    07d802e70ee52d0e57c6e846bd7203c1

  • SHA1

    0b2182bfe7fa0ea3d8a3f2f7813f3acbb7e124a0

  • SHA256

    ed7c91821cdd4b8754f11587c5afcb44249bd32f08c6e318c77ffe3f510f2189

  • SHA512

    30c0940cb444e5ead086d170da7adfd2410d250b08135fa6fe859cce108113a6c4d846a86d70a4da355dade97c9afd6e48e538738d9b405a5de34574fdc15942

  • SSDEEP

    1536:D2CaoqqLjmM3nsbWLZ48VOETrXKSQ/zIDOP/pVdM:D2CaoDmM3LZ48kE3EbaOnfS

Score
10/10

Malware Config

Extracted

Family

mirai

C2

botnet.4gnekoland.top

Targets

    • Target

      726aa14431a4fb7873e683493102c01601d462fb1fbce71767b6a97f0897bb28.elf

    • Size

      150KB

    • MD5

      d483630fac747cc0d965d82ff47b1302

    • SHA1

      3f7692c377c465b3f0997b97539b1306ca6fb2a2

    • SHA256

      726aa14431a4fb7873e683493102c01601d462fb1fbce71767b6a97f0897bb28

    • SHA512

      8d3a556390a043755fa722933ef3fe432934415df1bfcd88528bd6f07b4cecb419ef414895c612dd0fe7b262968c149a9a3571cebb9e89c73c9893222c6f5e3f

    • SSDEEP

      3072:UgwtPutmOWv2Z2tWFrCs84m3nmfT8QUHHuaHsQ:Ug1yC2Qto4mWfT8xHuaHj

    Score
    9/10
    • Contacts a large (76264) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Matrix ATT&CK v13

Tasks