General
-
Target
elitebotnet.mpsl.elf
-
Size
99KB
-
Sample
250113-lhl5lazjhq
-
MD5
3b2a8e0b62d3ffdba0543724d2a0761e
-
SHA1
3655b74119e0b47bd06f474beacbc5ad6a870d81
-
SHA256
e64a236cdba06f5e9831e9d6b2b4f1672e57f6c08a3c4d15df4447da82a918d0
-
SHA512
e1ff9c89dfca7d6bfbdfaebbf43b7fc37da67062f9b3d22a44069ba138eb41e3b1a34a98c3f50dd0be279eaee20ae073afc17d70dea0a0693ee25434ffdd69b6
-
SSDEEP
3072:6B1CUybA2iyeqyySZYK7ao/Ev8wbZnMZ7:6B1CUD2ieyySZYK7ao//wRMp
Behavioral task
behavioral1
Sample
elitebotnet.mpsl.elf
Resource
debian12-mipsel-20240418-en
Malware Config
Extracted
mirai
MIRAI
asdfui.elite-api.su
Targets
-
-
Target
elitebotnet.mpsl.elf
-
Size
99KB
-
MD5
3b2a8e0b62d3ffdba0543724d2a0761e
-
SHA1
3655b74119e0b47bd06f474beacbc5ad6a870d81
-
SHA256
e64a236cdba06f5e9831e9d6b2b4f1672e57f6c08a3c4d15df4447da82a918d0
-
SHA512
e1ff9c89dfca7d6bfbdfaebbf43b7fc37da67062f9b3d22a44069ba138eb41e3b1a34a98c3f50dd0be279eaee20ae073afc17d70dea0a0693ee25434ffdd69b6
-
SSDEEP
3072:6B1CUybA2iyeqyySZYK7ao/Ev8wbZnMZ7:6B1CUD2ieyySZYK7ao//wRMp
Score9/10-
Contacts a large (23833) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
File and Directory Permissions Modification
Adversaries may modify file or directory permissions to evade defenses.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Boot or Logon Initialization Scripts
1RC Scripts
1Privilege Escalation
Boot or Logon Autostart Execution
1Boot or Logon Initialization Scripts
1RC Scripts
1