General

  • Target

    x86.elf

  • Size

    48KB

  • Sample

    250210-1t1vfszlgm

  • MD5

    09081f6bb925c11977d58e0c7c7c4565

  • SHA1

    f8b5f731d22918991b6948819a6f1909b8cce228

  • SHA256

    aed80574b7f404e80f3ddea523a856799d1382a5c53ed494ced6d31062f80375

  • SHA512

    b99667bce9ddfc887cc0f9e6216b22839a00fb7ea77611e6eb10aecc523c35461e7755bc1c8e3f9b58ec1611962e589dcccafa505de1d343f4d850283855bad8

  • SSDEEP

    1536:aH3oG7jBo2VZXuP58uwVcROH9u/Sre1szExab:aH40jBo2ru58uUcoc/SreyzS8

Malware Config

Extracted

Family

mirai

Botnet

BOTNET

Targets

    • Target

      x86.elf

    • Size

      48KB

    • MD5

      09081f6bb925c11977d58e0c7c7c4565

    • SHA1

      f8b5f731d22918991b6948819a6f1909b8cce228

    • SHA256

      aed80574b7f404e80f3ddea523a856799d1382a5c53ed494ced6d31062f80375

    • SHA512

      b99667bce9ddfc887cc0f9e6216b22839a00fb7ea77611e6eb10aecc523c35461e7755bc1c8e3f9b58ec1611962e589dcccafa505de1d343f4d850283855bad8

    • SSDEEP

      1536:aH3oG7jBo2VZXuP58uwVcROH9u/Sre1szExab:aH40jBo2ru58uUcoc/SreyzS8

    Score
    9/10
    • Contacts a large (183661) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Loads a kernel module

      Loads a Linux kernel module, potentially to achieve persistence

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

MITRE ATT&CK Enterprise v15

Tasks