General

  • Target

    8f42b01d0fef5ad497a6c21748cdda518ca16d24e6b00fc60e6619c1579c1fcd.elf

  • Size

    69KB

  • Sample

    241221-db36ja1mhj

  • MD5

    dba94c12af61c09af2fd44b158b7497f

  • SHA1

    5e0234344adf2d109cdee2c8f026c94a583c0e45

  • SHA256

    8f42b01d0fef5ad497a6c21748cdda518ca16d24e6b00fc60e6619c1579c1fcd

  • SHA512

    fbfee022eb760f01b161ee85081fc049fb6b1b4e108732960d51c6b72e45a6d1fd5b4eedfa058b3b5245f81215d16091805dd7c0a765fed45e7851b11ea96589

  • SSDEEP

    1536:AiZ7CEQBUky+k9dhb59gitgHtB0D+8boZnR5zk:AipKUkyfVb59giGHtB07bCXzk

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

BOTNET

Targets

    • Target

      8f42b01d0fef5ad497a6c21748cdda518ca16d24e6b00fc60e6619c1579c1fcd.elf

    • Size

      69KB

    • MD5

      dba94c12af61c09af2fd44b158b7497f

    • SHA1

      5e0234344adf2d109cdee2c8f026c94a583c0e45

    • SHA256

      8f42b01d0fef5ad497a6c21748cdda518ca16d24e6b00fc60e6619c1579c1fcd

    • SHA512

      fbfee022eb760f01b161ee85081fc049fb6b1b4e108732960d51c6b72e45a6d1fd5b4eedfa058b3b5245f81215d16091805dd7c0a765fed45e7851b11ea96589

    • SSDEEP

      1536:AiZ7CEQBUky+k9dhb59gitgHtB0D+8boZnR5zk:AipKUkyfVb59giGHtB07bCXzk

    Score
    9/10
    • Contacts a large (289781) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

MITRE ATT&CK Enterprise v15

Tasks