Malware Analysis Report

2024-10-10 12:15

Sample ID 240710-aebnxawcpc
Target 63ff37df8aaaad106bc8ea2668c4fcb9.elf
SHA256 4548555377aa32358b43ca6034c9a0772911f16939f44e2131b5052b08544ef6
Tags
echobot mirai
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

4548555377aa32358b43ca6034c9a0772911f16939f44e2131b5052b08544ef6

Threat Level: Known bad

The file 63ff37df8aaaad106bc8ea2668c4fcb9.elf was found to be: Known bad.

Malicious Activity Summary

echobot mirai

Mirai family

Detected Echobot

Echobot family

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2024-07-10 00:07

Signatures

Detected Echobot

Description Indicator Process Target
N/A N/A N/A N/A

Echobot family

echobot

Mirai family

mirai

Analysis: behavioral1

Detonation Overview

Submitted

2024-07-10 00:07

Reported

2024-07-10 00:09

Platform

ubuntu1804-amd64-20240508-en

Max time kernel

0s

Max time network

130s

Command Line

[/tmp/63ff37df8aaaad106bc8ea2668c4fcb9.elf]

Signatures

N/A

Processes

/tmp/63ff37df8aaaad106bc8ea2668c4fcb9.elf

[/tmp/63ff37df8aaaad106bc8ea2668c4fcb9.elf]

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
GB 185.125.188.61:443 tcp
GB 185.125.188.61:443 tcp
US 151.101.1.91:443 tcp
US 151.101.1.91:443 tcp
GB 89.187.167.3:443 tcp
US 1.1.1.1:53 1527653184.rsc.cdn77.org udp
US 1.1.1.1:53 1527653184.rsc.cdn77.org udp
GB 89.187.167.39:443 1527653184.rsc.cdn77.org tcp

Files

N/A