General

  • Target

    RpcSecurity.x86_64.elf

  • Size

    57KB

  • Sample

    241227-gb6hfasmdm

  • MD5

    39bff6dfbebcc7384aeffa2fa223740d

  • SHA1

    e44dd947d33d893e69d218ab34e4630912608fe4

  • SHA256

    283f825ddc438241c828c11c51bb201c830a6684a1e511d18e40415a788199de

  • SHA512

    bd811f999233591b1ef5b881ac517775f956544e0b771142bad8bcf81e7f029b8290bce94f5075d20a6fa7de95bfe4ebf78778e343489eb03612f97339e060b0

  • SSDEEP

    1536:1XIY73si3qEToSRhINAQ/K6C8u50pfEHwNLJ:2Y7H6ETRhIx/Kn5qEHw1J

Malware Config

Extracted

Family

mirai

Botnet

DEMONS

Targets

    • Target

      RpcSecurity.x86_64.elf

    • Size

      57KB

    • MD5

      39bff6dfbebcc7384aeffa2fa223740d

    • SHA1

      e44dd947d33d893e69d218ab34e4630912608fe4

    • SHA256

      283f825ddc438241c828c11c51bb201c830a6684a1e511d18e40415a788199de

    • SHA512

      bd811f999233591b1ef5b881ac517775f956544e0b771142bad8bcf81e7f029b8290bce94f5075d20a6fa7de95bfe4ebf78778e343489eb03612f97339e060b0

    • SSDEEP

      1536:1XIY73si3qEToSRhINAQ/K6C8u50pfEHwNLJ:2Y7H6ETRhIx/Kn5qEHw1J

    Score
    6/10
    • Enumerates active TCP sockets

      Gets active TCP sockets from /proc virtual filesystem.

MITRE ATT&CK Enterprise v15

Tasks