General

  • Target

    61ee479993ea6342e20591591ab68285e33093ea9f6b2a18899c176b6aa4e800.elf

  • Size

    70KB

  • Sample

    241221-c4qkga1kgj

  • MD5

    44606f7ee1e7deb82aad0922515c1e89

  • SHA1

    f54245c696c4247f1b00e732883e16c3cf9f3934

  • SHA256

    61ee479993ea6342e20591591ab68285e33093ea9f6b2a18899c176b6aa4e800

  • SHA512

    747aee1ec2ac6cc1dc9abb184d65cb9958aed8d1ce32043b5c57e1611b69d1f7e587a35fd9f84b4127a2d39687b40c729b26514fa9e246acae52b449ad1e3061

  • SSDEEP

    1536:Ml65jC3iUk7bk9dFN535t+uYPTvK0SOGFsoclkzk:Ml65jkk7gpN535EuYPTtG/zzk

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

BOTNET

Targets

    • Target

      61ee479993ea6342e20591591ab68285e33093ea9f6b2a18899c176b6aa4e800.elf

    • Size

      70KB

    • MD5

      44606f7ee1e7deb82aad0922515c1e89

    • SHA1

      f54245c696c4247f1b00e732883e16c3cf9f3934

    • SHA256

      61ee479993ea6342e20591591ab68285e33093ea9f6b2a18899c176b6aa4e800

    • SHA512

      747aee1ec2ac6cc1dc9abb184d65cb9958aed8d1ce32043b5c57e1611b69d1f7e587a35fd9f84b4127a2d39687b40c729b26514fa9e246acae52b449ad1e3061

    • SSDEEP

      1536:Ml65jC3iUk7bk9dFN535t+uYPTvK0SOGFsoclkzk:Ml65jkk7gpN535EuYPTtG/zzk

    Score
    9/10
    • Contacts a large (291461) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

MITRE ATT&CK Enterprise v15

Tasks