General

  • Target

    6ed9f8d984d41fe016a1a4b025c20758.bin

  • Size

    42KB

  • Sample

    241222-bqr1psxmdx

  • MD5

    9b430899d1c93af4ae3fabcda1164619

  • SHA1

    08f26d199d8e7029244b6e258bba0b437d6dd28c

  • SHA256

    aa44e11a2f0b5dc34b94f5c86a6eb0268ec95a8172946ea80d75e21f40bcc9ce

  • SHA512

    486a478ff7d29465cc4b38d914b21bef0a422fc617535244562cb0531d4ab3e7b4e72f19196786a5bf6a30ef32f9331aa39d93e92522baea06dcccdcede35ca3

  • SSDEEP

    768:0oAIyVlDyMDi9NJQUCk4L7EzAfWW3URkfvG8h2IrnyX9DKnUdNAjx:HAIyVtyMorQU/4LkYWW3URkHG8bbyX9k

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

BOTNET

Targets

    • Target

      5fef13fcea7bef065948a581550deb4b54f36dd72d0d9385b1012f991e5b04c6.elf

    • Size

      75KB

    • MD5

      6ed9f8d984d41fe016a1a4b025c20758

    • SHA1

      da4047ab5cecd85cd22660077c304ea261489369

    • SHA256

      5fef13fcea7bef065948a581550deb4b54f36dd72d0d9385b1012f991e5b04c6

    • SHA512

      ab261ed19eb20a3e9705a135d9590c484b884e82877e803a4f4c6d6797b3d6e5d7f4356aa69d756cc096d4b013c0a5ff410223a3f9eeac7f7ab6e997a7190462

    • SSDEEP

      1536:gxOvt3uPfoZ9mHmk9Vpk9dRH5L39tS/8FEQPQgu+5jmsS9vPzk:gxcJuPfQjkHOdH5L39U/8FEQ5ZaPzk

    Score
    9/10
    • Contacts a large (285455) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v15

Tasks