General

  • Target

    c64ff23936be1fa84db30dbfc514242b907e5b7939493fe0d2ed70e6eb5f6191.elf

  • Size

    89KB

  • Sample

    250307-hwwpeawset

  • MD5

    e4f8a7b553331548825d7084541bbd27

  • SHA1

    7d5ea091f711dcc86c2e5967a09525e73a45039f

  • SHA256

    c64ff23936be1fa84db30dbfc514242b907e5b7939493fe0d2ed70e6eb5f6191

  • SHA512

    f3f3d7ac736cd9550e59a3578307b955c5767bdf7b84c0b8797900c709e92ce16dc7c2fc89666ddb21165ab03baa70086a663e18047faeb65ed45f6ba1a219ea

  • SSDEEP

    1536:e85/5VgFU4e3xkkd90zrC8fHyZSP1QLLneeAa7410Wt5:T/IFBsx8lHyZSP1QLya4vv

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

DEMONS

Targets

    • Target

      c64ff23936be1fa84db30dbfc514242b907e5b7939493fe0d2ed70e6eb5f6191.elf

    • Size

      89KB

    • MD5

      e4f8a7b553331548825d7084541bbd27

    • SHA1

      7d5ea091f711dcc86c2e5967a09525e73a45039f

    • SHA256

      c64ff23936be1fa84db30dbfc514242b907e5b7939493fe0d2ed70e6eb5f6191

    • SHA512

      f3f3d7ac736cd9550e59a3578307b955c5767bdf7b84c0b8797900c709e92ce16dc7c2fc89666ddb21165ab03baa70086a663e18047faeb65ed45f6ba1a219ea

    • SSDEEP

      1536:e85/5VgFU4e3xkkd90zrC8fHyZSP1QLLneeAa7410Wt5:T/IFBsx8lHyZSP1QLya4vv

    Score
    6/10
    • Enumerates active TCP sockets

      Gets active TCP sockets from /proc virtual filesystem.

MITRE ATT&CK Enterprise v15

Tasks