General

  • Target

    28bb529e99c8730de533d64995979a491d6af643ddcd99997788ff945dc6b426.elf

  • Size

    49KB

  • Sample

    250307-dxhfystny9

  • MD5

    84597b4e86a02818478e8e9ef7c74485

  • SHA1

    80d83dea146a0fc48a5154c87d19bbefd3a1c26b

  • SHA256

    28bb529e99c8730de533d64995979a491d6af643ddcd99997788ff945dc6b426

  • SHA512

    02d3c182c9b10bc5a21a0459599d86b4254307e11e35e77e140c82dd97b86ed180c73c5068fd4706e6f7d2896b167521f5cbc67a89d457a1aaf77770180ae08f

  • SSDEEP

    1536:7uld7p12jkVJCWsAmSffClhgmd6+H/nHqY4ec:7uldP2jkV0BSfORH/Hqh/

Malware Config

Extracted

Family

mirai

Botnet

BOTNET

Targets

    • Target

      28bb529e99c8730de533d64995979a491d6af643ddcd99997788ff945dc6b426.elf

    • Size

      49KB

    • MD5

      84597b4e86a02818478e8e9ef7c74485

    • SHA1

      80d83dea146a0fc48a5154c87d19bbefd3a1c26b

    • SHA256

      28bb529e99c8730de533d64995979a491d6af643ddcd99997788ff945dc6b426

    • SHA512

      02d3c182c9b10bc5a21a0459599d86b4254307e11e35e77e140c82dd97b86ed180c73c5068fd4706e6f7d2896b167521f5cbc67a89d457a1aaf77770180ae08f

    • SSDEEP

      1536:7uld7p12jkVJCWsAmSffClhgmd6+H/nHqY4ec:7uldP2jkV0BSfORH/Hqh/

    Score
    9/10
    • Contacts a large (185401) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Loads a kernel module

      Loads a Linux kernel module, potentially to achieve persistence

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

MITRE ATT&CK Enterprise v15

Tasks