General

  • Target

    3e28033a1dd0ba3934530dd900d53456.bin

  • Size

    41KB

  • Sample

    241223-bhcwtatkgj

  • MD5

    68709285589eb4a9f64781b0341d622d

  • SHA1

    c253752f6c065e5bc039fd4a8987b009b939757b

  • SHA256

    816a8568462e1d49b6aad5bf2ad656b08636b9097b47eccbf1c7469d1234952a

  • SHA512

    5577cafb36817b19d7c1c7d18af4f13f6728b04e18fb44fc6740bff1105fdecd14d0a169056c34ee11144f951e01dede8b762cfd72b936e8a2d1d7c40796e908

  • SSDEEP

    768:k/aX0icQvDw3B1jQniNaMCjmELpJZLMbalx/OS7a4rWC93+PRL6H:kCEQvDwvsiNFCjmEt4Ed7a4rT3+PJ6H

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

BOTNET

Targets

    • Target

      4293af8935a04810c1a0edf22120d6780b8fc31cb9ed0e1ba6306fdff15e03c9.elf

    • Size

      91KB

    • MD5

      3e28033a1dd0ba3934530dd900d53456

    • SHA1

      ef4666b2655feade63925a546f2fc9e2a86269d7

    • SHA256

      4293af8935a04810c1a0edf22120d6780b8fc31cb9ed0e1ba6306fdff15e03c9

    • SHA512

      73c5b7ef016a91bd7bef7e051e21c580fb6831bf621530b1a24bf1a3b095127d61b6290e791835caf7ac2cf0f733c4460781b6b1040cea1558f24e0385ff0de4

    • SSDEEP

      1536:w4PToD4rofjA/CFEsQ3HZW6ZWmuW5SU/WFfqLMxYkGCC0yxe3xKTRh5zCQ:wGXx/CbQ3HSqkYkGC3yJFh5zCQ

    Score
    9/10
    • Contacts a large (217916) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

MITRE ATT&CK Enterprise v15

Tasks