General

  • Target

    5f9077245a8bd881f4a484ede89d6e4d.bin

  • Size

    42KB

  • Sample

    241223-blxematjbv

  • MD5

    ea0366dd5ffb79a270ae52fb4fb10fa0

  • SHA1

    f11a4dca764268db1a6365df0ec0de9799830e84

  • SHA256

    30fbf2a46a40e9995c5a7b445021205c80d500837da93d4a3ea79e5d09017629

  • SHA512

    54dc0510f9b09bf4d392bccd9b0992c90c7128317d605b6511c00e823c5e70bfc579bed3272d5b29594ee87f6c402f5e9a698f294a6fe3e20bd8019f48110fbd

  • SSDEEP

    768:pX8sEw1pHMf4rV+AmR3VQ6HSbds8Rt4WruvcQgDHBenX:pXKVO8Amf/SbdsgCcHBenX

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

BOTNET

Targets

    • Target

      875ec9e70673f8049e02d6d061e6bec597dbe68ccb31cfdaad54d2c05b6d1c7b.elf

    • Size

      95KB

    • MD5

      5f9077245a8bd881f4a484ede89d6e4d

    • SHA1

      ad002c54c920ba8a336e41dd6638b9ed6bc13f62

    • SHA256

      875ec9e70673f8049e02d6d061e6bec597dbe68ccb31cfdaad54d2c05b6d1c7b

    • SHA512

      2140fad63ffffef28c978d74a6414f776b9ecd0d199502f533f081c5d4a4666cd90f8acbc501ba626d084bc1c8ac15671487e5b855546553b9f4fedf8d465cbd

    • SSDEEP

      1536:NO7ijkRfjMudJkVlFCxFCSiCJ6TPPb/0ggyTjhnnVQ6e9P0DRdz3u:HYyuIVB70KTjhnVQ8Rdz3u

    Score
    9/10
    • Contacts a large (294834) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

MITRE ATT&CK Enterprise v15

Tasks