General

  • Target

    RpcSecurity.mpsl.elf

  • Size

    75KB

  • Sample

    241227-f8aatsskgt

  • MD5

    909e68d7f9baf5b2c79023ca027aa132

  • SHA1

    1a17caa726700e04242251f101298bf209c54c18

  • SHA256

    8ad68a6dd76f0ca58d1651343916807370fabc294394c12cb4209d5cdb7dc259

  • SHA512

    31c1925c839304e1336d1b09a0e30734ff6bb2d476ae6174eebfebce5664ff8944e2acd986b57b2e0045ba6a1f760d7003cb3920fdf3746789df321423f7579e

  • SSDEEP

    1536:7J5dbFB4x92nKoIHa98M26ofWU+UZ9CYXzdJa10o:7J5dxBu9uKoqIUXd4f

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

DEMONS

Targets

    • Target

      RpcSecurity.mpsl.elf

    • Size

      75KB

    • MD5

      909e68d7f9baf5b2c79023ca027aa132

    • SHA1

      1a17caa726700e04242251f101298bf209c54c18

    • SHA256

      8ad68a6dd76f0ca58d1651343916807370fabc294394c12cb4209d5cdb7dc259

    • SHA512

      31c1925c839304e1336d1b09a0e30734ff6bb2d476ae6174eebfebce5664ff8944e2acd986b57b2e0045ba6a1f760d7003cb3920fdf3746789df321423f7579e

    • SSDEEP

      1536:7J5dbFB4x92nKoIHa98M26ofWU+UZ9CYXzdJa10o:7J5dxBu9uKoqIUXd4f

    Score
    6/10
    • Enumerates active TCP sockets

      Gets active TCP sockets from /proc virtual filesystem.

MITRE ATT&CK Enterprise v15

Tasks