General

  • Target

    659a3f750bf48969cceb9a870716b5eb461e94b89ea7d447ac1ee65468b682a9.elf

  • Size

    96KB

  • Sample

    241221-c43j2azqfv

  • MD5

    28072dae915931fce3b860dd02a617c3

  • SHA1

    f78ce189ed76ad82d2e8faabef7f9358fd246454

  • SHA256

    659a3f750bf48969cceb9a870716b5eb461e94b89ea7d447ac1ee65468b682a9

  • SHA512

    184fd4dfd7cc0fb3bac71dee15ab50a266dfa730e8bbf531c67037e5381ec512049f7e05d1c7f843fce608f7fcc35e0b39eb57a612e59ef73ced34bade201466

  • SSDEEP

    3072:i3VjdYsCmHubaQZ264gwrTye/7j8qvczh6H0:i3L7abaQZ264geTj7Yq66H0

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

BOTNET

Targets

    • Target

      659a3f750bf48969cceb9a870716b5eb461e94b89ea7d447ac1ee65468b682a9.elf

    • Size

      96KB

    • MD5

      28072dae915931fce3b860dd02a617c3

    • SHA1

      f78ce189ed76ad82d2e8faabef7f9358fd246454

    • SHA256

      659a3f750bf48969cceb9a870716b5eb461e94b89ea7d447ac1ee65468b682a9

    • SHA512

      184fd4dfd7cc0fb3bac71dee15ab50a266dfa730e8bbf531c67037e5381ec512049f7e05d1c7f843fce608f7fcc35e0b39eb57a612e59ef73ced34bade201466

    • SSDEEP

      3072:i3VjdYsCmHubaQZ264gwrTye/7j8qvczh6H0:i3L7abaQZ264geTj7Yq66H0

    Score
    9/10
    • Contacts a large (280388) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

MITRE ATT&CK Enterprise v15

Tasks