General

  • Target

    5474721581708c747a2495a64b8888b5b0b8c609d12b4fc5886b5a00c3ea428f.elf

  • Size

    95KB

  • Sample

    241221-c2h3lszqaz

  • MD5

    0a3f744a63b91c115ebea2513a1675c1

  • SHA1

    ff4713c542fc3a2eadfa9aaed42353008d5cb489

  • SHA256

    5474721581708c747a2495a64b8888b5b0b8c609d12b4fc5886b5a00c3ea428f

  • SHA512

    86966e587d6fe3cded1885a60d1f0c6bc6ac5ece858889075fcc2c289a3d0185d4b3b374fa8342d7284fac334d7a3c4bf2b30a37c1a89d538489a2fa93f34390

  • SSDEEP

    1536:tOD6zMqfjMufvF0sNFNi5NiCyiZKQ+f8Waf0ogCDhJvvNYelH7L5Rz3m:HgbufvbN5zq0SDhJ3NB5Rz3m

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

BOTNET

Targets

    • Target

      5474721581708c747a2495a64b8888b5b0b8c609d12b4fc5886b5a00c3ea428f.elf

    • Size

      95KB

    • MD5

      0a3f744a63b91c115ebea2513a1675c1

    • SHA1

      ff4713c542fc3a2eadfa9aaed42353008d5cb489

    • SHA256

      5474721581708c747a2495a64b8888b5b0b8c609d12b4fc5886b5a00c3ea428f

    • SHA512

      86966e587d6fe3cded1885a60d1f0c6bc6ac5ece858889075fcc2c289a3d0185d4b3b374fa8342d7284fac334d7a3c4bf2b30a37c1a89d538489a2fa93f34390

    • SSDEEP

      1536:tOD6zMqfjMufvF0sNFNi5NiCyiZKQ+f8Waf0ogCDhJvvNYelH7L5Rz3m:HgbufvbN5zq0SDhJ3NB5Rz3m

    Score
    9/10
    • Contacts a large (111959) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

MITRE ATT&CK Enterprise v15

Tasks