General

  • Target

    TRC.x86.elf

  • Size

    72KB

  • Sample

    241214-vw11ca1jcr

  • MD5

    d36df8c6196d7a1a69f19fca0a920c21

  • SHA1

    784d3ad8de8e14e06a592fa856b5c5c421841dfc

  • SHA256

    524eed0cc5e16a7d26efb46ce9d09641470c2db156d69558270f0c9de0271c2f

  • SHA512

    3d834bd5b484a71aaabcd7d5ef004d4a271ba801c320741adcfa1885c0ac5d554dd2d955d9b102e347b0acc32cf0c9c4d86af1322916e7612a36c26a16f3a10c

  • SSDEEP

    1536:gEKGADH0fCgPVB/ZzNmevvUdSu/4SWof/dYP7dsotiImlK:TKTDUfCcVBhkwvUdSuASWe/kxsoYIyK

Malware Config

Extracted

Family

mirai

Botnet

MIRAI

Targets

    • Target

      TRC.x86.elf

    • Size

      72KB

    • MD5

      d36df8c6196d7a1a69f19fca0a920c21

    • SHA1

      784d3ad8de8e14e06a592fa856b5c5c421841dfc

    • SHA256

      524eed0cc5e16a7d26efb46ce9d09641470c2db156d69558270f0c9de0271c2f

    • SHA512

      3d834bd5b484a71aaabcd7d5ef004d4a271ba801c320741adcfa1885c0ac5d554dd2d955d9b102e347b0acc32cf0c9c4d86af1322916e7612a36c26a16f3a10c

    • SSDEEP

      1536:gEKGADH0fCgPVB/ZzNmevvUdSu/4SWof/dYP7dsotiImlK:TKTDUfCcVBhkwvUdSuASWe/kxsoYIyK

    Score
    9/10
    • Contacts a large (20232) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Loads a kernel module

      Loads a Linux kernel module, potentially to achieve persistence

MITRE ATT&CK Enterprise v15

Tasks