General

  • Target

    x86.elf

  • Size

    48KB

  • Sample

    250215-rcfnhs1rhj

  • MD5

    3f283e63f4baa9721604e9238968c4ca

  • SHA1

    f6b21f8d0822b9fdf8805632621139f69955c276

  • SHA256

    8ff05f51c484428ac251e3c3391c633e39b97eac2077e91f507f58d9ead09a37

  • SHA512

    3f5ade9245b26de4567bcf31ea1f4ec40144d46dac65439045b4c7a8134f3ecf242938c0617b4abd051a5a35a33f3c10b7ba472ed7275495ac5fa14f52d1cde3

  • SSDEEP

    1536:I1z8LJFEgCxkC9ax+Dd2mTbxH/H1yG14jzSCCZMNJD:I1w3EgikC9g+DxbxHf1yGinqC

Malware Config

Extracted

Family

mirai

Botnet

KURC

Targets

    • Target

      x86.elf

    • Size

      48KB

    • MD5

      3f283e63f4baa9721604e9238968c4ca

    • SHA1

      f6b21f8d0822b9fdf8805632621139f69955c276

    • SHA256

      8ff05f51c484428ac251e3c3391c633e39b97eac2077e91f507f58d9ead09a37

    • SHA512

      3f5ade9245b26de4567bcf31ea1f4ec40144d46dac65439045b4c7a8134f3ecf242938c0617b4abd051a5a35a33f3c10b7ba472ed7275495ac5fa14f52d1cde3

    • SSDEEP

      1536:I1z8LJFEgCxkC9ax+Dd2mTbxH/H1yG14jzSCCZMNJD:I1w3EgikC9g+DxbxHf1yGinqC

    Score
    9/10
    • Contacts a large (23995) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Loads a kernel module

      Loads a Linux kernel module, potentially to achieve persistence

MITRE ATT&CK Enterprise v15

Tasks