General

  • Target

    na.elf

  • Size

    95KB

  • Sample

    241221-qnmerszqaw

  • MD5

    b852ccf9f811ed9d1fb4978f44c770b9

  • SHA1

    db50b67add74d12bb291ef3c3c6664d12eae82b8

  • SHA256

    88194d7e8b4131ded628de436327ecf92580e2b58163e402effeccecf02c60a6

  • SHA512

    96ee39bdd85f00007344d0e54cdebf212bf61998df947eb0a138d59cd29a3db13426f65bb38a0ebdd837a87d8994083410b6b31ba0322c769cc6506853f15114

  • SSDEEP

    1536:s+bebEifjM8fEDe1uO1uRvuiFbpyNfVOKFvBwLeFxBePZCV90z1NB:kwD8cDfYkWBwLWxj90z1NB

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

BOTNET

Targets

    • Target

      na.elf

    • Size

      95KB

    • MD5

      b852ccf9f811ed9d1fb4978f44c770b9

    • SHA1

      db50b67add74d12bb291ef3c3c6664d12eae82b8

    • SHA256

      88194d7e8b4131ded628de436327ecf92580e2b58163e402effeccecf02c60a6

    • SHA512

      96ee39bdd85f00007344d0e54cdebf212bf61998df947eb0a138d59cd29a3db13426f65bb38a0ebdd837a87d8994083410b6b31ba0322c769cc6506853f15114

    • SSDEEP

      1536:s+bebEifjM8fEDe1uO1uRvuiFbpyNfVOKFvBwLeFxBePZCV90z1NB:kwD8cDfYkWBwLWxj90z1NB

    Score
    9/10
    • Contacts a large (238575) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

MITRE ATT&CK Enterprise v15

Tasks