General

  • Target

    njvwa4.elf

  • Size

    158KB

  • Sample

    241228-v6jttazrcl

  • MD5

    881173edb59fafe1226bdb50fdb99c4b

  • SHA1

    0606321d9ce01653715a63b4cb574e6ab896c39b

  • SHA256

    5f1c421ed3ab639f03e7850408ba9753abaedd118d35089dbed0692ac455b7ab

  • SHA512

    64c838307f5a5e8c788a1c4e75edbab2d1574397786b4263ee4b96841ea4e77c666c95334605d1f516a2e840b40f14b3373a93cc212a1aad82701487b035f5f0

  • SSDEEP

    1536:ec8n+sXCFKtDnofa+0RXivAppBCAsmo4Vp7gTCU33qW53O/ly0iVu2L5lmlwywrG:ec8nlDo/02A7BCV4rgmU33zDnIWvTxs

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

BOTNET

C2

89.190.156.145

Targets

    • Target

      njvwa4.elf

    • Size

      158KB

    • MD5

      881173edb59fafe1226bdb50fdb99c4b

    • SHA1

      0606321d9ce01653715a63b4cb574e6ab896c39b

    • SHA256

      5f1c421ed3ab639f03e7850408ba9753abaedd118d35089dbed0692ac455b7ab

    • SHA512

      64c838307f5a5e8c788a1c4e75edbab2d1574397786b4263ee4b96841ea4e77c666c95334605d1f516a2e840b40f14b3373a93cc212a1aad82701487b035f5f0

    • SSDEEP

      1536:ec8n+sXCFKtDnofa+0RXivAppBCAsmo4Vp7gTCU33qW53O/ly0iVu2L5lmlwywrG:ec8nlDo/02A7BCV4rgmU33zDnIWvTxs

    Score
    7/10
    • Deletes itself

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Matrix

Tasks