General

  • Target

    d1eb6155452f3ab97e2df1311a93514c6c4be839810a31307404b22a21ca400f.elf

  • Size

    201KB

  • Sample

    241230-c9v25swjaj

  • MD5

    939406d5d370d1a039a9b0829d910b05

  • SHA1

    bb57f12fd67203f883797bc83760bad871e0b386

  • SHA256

    d1eb6155452f3ab97e2df1311a93514c6c4be839810a31307404b22a21ca400f

  • SHA512

    c1cf7c03d70c992acb0f29404552ac5ceb952a173a581ccf46dad9c4ce4973f675a612132ee8c375c0656d4dabe7e9c28a78e6d0f8f5c3ba3bb252308be2466b

  • SSDEEP

    6144:hTp5awLcubcu/vcrnfaVXkiGmxRi0Zk9UyVNM/9BuSY7:hTnawLcuIu/unfaVXkiGmTZmp6/aL

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

OWARI

Targets

    • Target

      d1eb6155452f3ab97e2df1311a93514c6c4be839810a31307404b22a21ca400f.elf

    • Size

      201KB

    • MD5

      939406d5d370d1a039a9b0829d910b05

    • SHA1

      bb57f12fd67203f883797bc83760bad871e0b386

    • SHA256

      d1eb6155452f3ab97e2df1311a93514c6c4be839810a31307404b22a21ca400f

    • SHA512

      c1cf7c03d70c992acb0f29404552ac5ceb952a173a581ccf46dad9c4ce4973f675a612132ee8c375c0656d4dabe7e9c28a78e6d0f8f5c3ba3bb252308be2466b

    • SSDEEP

      6144:hTp5awLcubcu/vcrnfaVXkiGmxRi0Zk9UyVNM/9BuSY7:hTnawLcuIu/unfaVXkiGmTZmp6/aL

    Score
    6/10
    • Enumerates active TCP sockets

      Gets active TCP sockets from /proc virtual filesystem.

MITRE ATT&CK Enterprise v15

Tasks