General

  • Target

    0bdf628b8440886203e1f45d3682130a.bin

  • Size

    42KB

  • Sample

    241223-bcr4jstjgq

  • MD5

    fae5bf255c8c88623e419358a7cafad7

  • SHA1

    c4dbaaee10af23ca77bd29b900cb35cca1295196

  • SHA256

    a4f914e2fe08f52492791bf801c36c6232f9d70ffc54fcdde3e3ec6571403655

  • SHA512

    792eb7d4e2d9239f844874245d46f3d203d8e0547d0050d7f61b51c21b14bb13f60d29011f209b8ad6588db141bff7b45f9c83e4f53c304291e8b56d3cf5cebc

  • SSDEEP

    768:zLQ2V83QiaNNu/GFE1fU8Pu95BUqVUlrL9RSPtpYMMCdeTf:fi3f0Nu/GFFQs5eqVGH2PngT

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

BOTNET

Targets

    • Target

      252450f86c557a4eb2dfbebd6820b602b6fca68661caacc2fc4f1f3bfe50a883.elf

    • Size

      95KB

    • MD5

      0bdf628b8440886203e1f45d3682130a

    • SHA1

      40186d96c2a3be219eb0915a0dd7c9802288f1bf

    • SHA256

      252450f86c557a4eb2dfbebd6820b602b6fca68661caacc2fc4f1f3bfe50a883

    • SHA512

      b07b6c1c677e9f4f143ea02b247864c03f25220074a99b7f66f9e616af482623e5ae6c50fa12386079f468375853d18bccd7c5d83e4a4dde12030219089f8e28

    • SSDEEP

      1536:CbU6OoTiUD/LN0boB9Z4F4J62HNh9kyhqduZPIfCMj6aPAu2Sc4Azd:CbU6DTfqoU2th9jhyuppcAzd

    Score
    9/10
    • Contacts a large (189051) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

MITRE ATT&CK Enterprise v15

Tasks