General

  • Target

    splx86.elf

  • Size

    49KB

  • Sample

    250307-pxd93szxgv

  • MD5

    40de42f7a79e12e918f20d12827350c2

  • SHA1

    e5eb06f7d7deb093b3e8ea68b5034252213f220c

  • SHA256

    0b808960750a09b443541379d43b16c8a3e42045f487004b2cf10a8c9d7e29c9

  • SHA512

    08e91d399651ed60b7998f26a0b00ad96cc6263a471b5431b080164c940b5221061378fc379acfc685808caa9d4933395831b6e8c7ef9c4227bc38a3528bbbaa

  • SSDEEP

    1536:7uld7p12jkVJCWsAmSfFkCggnalGSHfnHqs4ec:7uldP2jkV0BSfGZHfHq9/

Malware Config

Extracted

Family

mirai

Botnet

BOTNET

Targets

    • Target

      splx86.elf

    • Size

      49KB

    • MD5

      40de42f7a79e12e918f20d12827350c2

    • SHA1

      e5eb06f7d7deb093b3e8ea68b5034252213f220c

    • SHA256

      0b808960750a09b443541379d43b16c8a3e42045f487004b2cf10a8c9d7e29c9

    • SHA512

      08e91d399651ed60b7998f26a0b00ad96cc6263a471b5431b080164c940b5221061378fc379acfc685808caa9d4933395831b6e8c7ef9c4227bc38a3528bbbaa

    • SSDEEP

      1536:7uld7p12jkVJCWsAmSfFkCggnalGSHfnHqs4ec:7uldP2jkV0BSfGZHfHq9/

    Score
    9/10
    • Contacts a large (67026) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Loads a kernel module

      Loads a Linux kernel module, potentially to achieve persistence

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

MITRE ATT&CK Enterprise v15

Tasks