Malware Analysis Report

2024-10-10 11:03

Sample ID 240710-lt5q3sshkd
Target 7ba6d6ebff8f3a3c0c4f39a3a45ce3d166decfb56ab1213787cc9125a9bb6ec6.elf
SHA256 7ba6d6ebff8f3a3c0c4f39a3a45ce3d166decfb56ab1213787cc9125a9bb6ec6
Tags
mirai mirai rootkit
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

7ba6d6ebff8f3a3c0c4f39a3a45ce3d166decfb56ab1213787cc9125a9bb6ec6

Threat Level: Known bad

The file 7ba6d6ebff8f3a3c0c4f39a3a45ce3d166decfb56ab1213787cc9125a9bb6ec6.elf was found to be: Known bad.

Malicious Activity Summary

mirai mirai rootkit

Mirai family

Loads a kernel module

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2024-07-10 09:50

Signatures

Mirai family

mirai

Analysis: behavioral1

Detonation Overview

Submitted

2024-07-10 09:50

Reported

2024-07-10 09:53

Platform

ubuntu2404-amd64-20240523-en

Max time kernel

143s

Max time network

152s

Command Line

[/tmp/7ba6d6ebff8f3a3c0c4f39a3a45ce3d166decfb56ab1213787cc9125a9bb6ec6.elf]

Signatures

Processes

/tmp/7ba6d6ebff8f3a3c0c4f39a3a45ce3d166decfb56ab1213787cc9125a9bb6ec6.elf

[/tmp/7ba6d6ebff8f3a3c0c4f39a3a45ce3d166decfb56ab1213787cc9125a9bb6ec6.elf]

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
US 65.222.202.53:80 tcp
US 65.222.202.53:80 tcp
US 65.222.202.53:80 tcp
US 65.222.202.53:80 tcp
US 65.222.202.53:80 tcp
US 65.222.202.53:80 tcp
US 65.222.202.53:80 tcp
US 65.222.202.53:80 tcp
US 65.222.202.53:80 tcp
US 65.222.202.53:80 tcp
US 65.222.202.53:80 tcp
US 65.222.202.53:80 tcp
US 65.222.202.53:80 tcp
US 65.222.202.53:80 tcp

Files

N/A