General

  • Target

    874a3ac4fd35321b47b7c4f6a3de963f239ef599fca5e4ee0fbda832b2ade89c.elf

  • Size

    83KB

  • Sample

    241222-csjmsazjcy

  • MD5

    23a0598f20eedd3be23be91892dea3a7

  • SHA1

    337b56ae51839bfbf6c2c5ed7556b5f6569bdd77

  • SHA256

    874a3ac4fd35321b47b7c4f6a3de963f239ef599fca5e4ee0fbda832b2ade89c

  • SHA512

    ad6618896630a3f3c767a9b0b87f9dcd15a51a81ea90214ee6c0783ec60e8f9db2f1f644854b6e8a7280ad670fad923e6241465c6904f2cbd4219e0e6dc88afa

  • SSDEEP

    1536:gjEoAtpCXtKitKzVKkYVFGlKzAZavduOPsSgkGRgbKkBfWE1fpQ6B/86YX8ZM3P+:zoA3CrFRAaduOPsSgkGRgbKkBfWE1fph

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

BOTNET

Targets

    • Target

      874a3ac4fd35321b47b7c4f6a3de963f239ef599fca5e4ee0fbda832b2ade89c.elf

    • Size

      83KB

    • MD5

      23a0598f20eedd3be23be91892dea3a7

    • SHA1

      337b56ae51839bfbf6c2c5ed7556b5f6569bdd77

    • SHA256

      874a3ac4fd35321b47b7c4f6a3de963f239ef599fca5e4ee0fbda832b2ade89c

    • SHA512

      ad6618896630a3f3c767a9b0b87f9dcd15a51a81ea90214ee6c0783ec60e8f9db2f1f644854b6e8a7280ad670fad923e6241465c6904f2cbd4219e0e6dc88afa

    • SSDEEP

      1536:gjEoAtpCXtKitKzVKkYVFGlKzAZavduOPsSgkGRgbKkBfWE1fpQ6B/86YX8ZM3P+:zoA3CrFRAaduOPsSgkGRgbKkBfWE1fph

    Score
    9/10
    • Contacts a large (232975) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

MITRE ATT&CK Enterprise v15

Tasks