General

  • Target

    0a3f744a63b91c115ebea2513a1675c1.bin

  • Size

    42KB

  • Sample

    241222-bc36taxjgr

  • MD5

    05378e74a61085838ee228036d683d1b

  • SHA1

    39eae101426d1b4a67c57b20bcdd1990e3c68b54

  • SHA256

    60847c281b5648c9f2e45d26aeec0762b4561b3c44ec9f36032669e25307a81c

  • SHA512

    fba246cdaa2c7821fb3d0ac4e3c9f1609355d26de1ecd99bc64ada0851377fd01ef843e26ae805135fc281eb5804f3315ef3e41e215f82c657da2fb51c490606

  • SSDEEP

    768:pL/xBoq/xRFIUEoZBsN3HOMBUt7zCX1hnvjeKh2ydy+GdpNeScHeDt1mpTB:pL5Boq/x/pEEKuMBS8hnv/7RWp2H02v

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

BOTNET

Targets

    • Target

      5474721581708c747a2495a64b8888b5b0b8c609d12b4fc5886b5a00c3ea428f.elf

    • Size

      95KB

    • MD5

      0a3f744a63b91c115ebea2513a1675c1

    • SHA1

      ff4713c542fc3a2eadfa9aaed42353008d5cb489

    • SHA256

      5474721581708c747a2495a64b8888b5b0b8c609d12b4fc5886b5a00c3ea428f

    • SHA512

      86966e587d6fe3cded1885a60d1f0c6bc6ac5ece858889075fcc2c289a3d0185d4b3b374fa8342d7284fac334d7a3c4bf2b30a37c1a89d538489a2fa93f34390

    • SSDEEP

      1536:tOD6zMqfjMufvF0sNFNi5NiCyiZKQ+f8Waf0ogCDhJvvNYelH7L5Rz3m:HgbufvbN5zq0SDhJ3NB5Rz3m

    Score
    9/10
    • Contacts a large (285276) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

MITRE ATT&CK Enterprise v15

Tasks