General

  • Target

    1a4375f6423f0c96f3d2377d1c157595.bin

  • Size

    51KB

  • Sample

    241223-bdbg7atkal

  • MD5

    47ab0b12a2c67cc288f0447ef32a51c2

  • SHA1

    eb3affdc02d1c624a3b1f43006f12a79b098e467

  • SHA256

    589dde3c587d720d5762edec729306329acd5ce8c9abfa5464c8834febdde357

  • SHA512

    9ef27843cf8886004e8a2897043ac35639023e07e1f0a9a660ba61c2eaf7f0a0988ce618e678fc3662236b8bf22e4e734e232a8d94e74ae417367d5e2126bba2

  • SSDEEP

    768:Pm824+zg/nx7a38kgpTWH7Twf9kBl4+oP8UiVhSWSPNxw6zkzELi05ql1Ww6Q:Pm+RZ23gU70fulgP8Hozz5M1zP

Malware Config

Extracted

Family

mirai

Botnet

BOTNET

Targets

    • Target

      4d315e63c562b354627d6b169e197d5cf108f318b446dac59c8edff283314e9d.elf

    • Size

      97KB

    • MD5

      1a4375f6423f0c96f3d2377d1c157595

    • SHA1

      fec7b3bd66d1d4a88b7a22511962007f7b99e34b

    • SHA256

      4d315e63c562b354627d6b169e197d5cf108f318b446dac59c8edff283314e9d

    • SHA512

      fca72e6629a9e1440df86bb7c46592f6f0294aafdfd4839f461862dcbafcc3cc534d71061f3e43d870655fb56d5417258074e0994e568c7b044a41fb87ba8be2

    • SSDEEP

      3072:GKsAW3h8xjDI0taCqGwapyAuKltAJzL7azhHH:GKSRPsaCqGwapPu8AhLIHH

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • Redline family

    • Contacts a large (248573) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

MITRE ATT&CK Enterprise v15

Tasks