General

  • Target

    dcb0dc8287e78f2bda47f5b19b1f08ac.bin

  • Size

    64KB

  • Sample

    240708-elxbeatdng

  • MD5

    11fe83a5406ef5071c63166956befacf

  • SHA1

    332105a04d2ed208cb64a3b96af30249877bc328

  • SHA256

    fe2600532dabcfe55555d27a86184d9565bbd4fe047c960245993ca45f39285b

  • SHA512

    1d3ebea049e232f7ea1a2478470211c0077c1120e6a423144e092c39b9a34182f4bc50a8fe1c025c768d7c951e18df3929ff325f50500204788d6fa2924194c6

  • SSDEEP

    1536:G0h+21UfvtahOjiHm6ejd5UyIrnS4Wgj7KK23LxImAQG0uc:7+1aKJEyYBE3LxIvt0uc

Score
10/10

Malware Config

Extracted

Family

mirai

C2

botnet.4gnekoland.top

Targets

    • Target

      143e65a125e9aadbbe352773c24d049adb07c9ec1c9151f70f0dfc53131f860a.elf

    • Size

      146KB

    • MD5

      dcb0dc8287e78f2bda47f5b19b1f08ac

    • SHA1

      1bfcaeb52e8f333393b80133a7a247c9e65d02cc

    • SHA256

      143e65a125e9aadbbe352773c24d049adb07c9ec1c9151f70f0dfc53131f860a

    • SHA512

      6ab05e769159cce065fc0faab2bdf5316376d7c8b703beef4809939a6349dae2e65a29f14c95fdd34c5f40b312a191a2a7e3a72af772af443afc023118f8c367

    • SSDEEP

      3072:d4p2xNQux8uSA1rf1qQ4xG1+q6A1WSo8physp:d4cjr1DEQ4xu+q63SRhyO

    Score
    9/10
    • Contacts a large (74524) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Matrix ATT&CK v13

Tasks