General

  • Target

    x86.elf

  • Size

    77KB

  • Sample

    250310-m47h4ask16

  • MD5

    7bd4a93c3cbc7fbff42497d09e41ddff

  • SHA1

    c0aa7928a10d251cc23d674c68d8d66869e82aa4

  • SHA256

    cc394faaa76b94227b8b1d982175c13a32b9529a88d422664daf18ad1f664945

  • SHA512

    a5fc933113ce275eaeb4fd1ef50cb271099fbf05f0b09800a2ada6494dc6c272006b461891dac2e37a67670a08529022d43bdf81e32265cc8baf895a8aa1e3e4

  • SSDEEP

    1536:9//+vex62dbPz7TL9xoBYrZboXWGBvlUlXtMHOfEAC5wKEPcOKAuu3F3M:9//+Wx62dbPz7TL9xlZboGGBvlUlXbuS

Malware Config

Extracted

Family

mirai

Botnet

OWARI

Targets

    • Target

      x86.elf

    • Size

      77KB

    • MD5

      7bd4a93c3cbc7fbff42497d09e41ddff

    • SHA1

      c0aa7928a10d251cc23d674c68d8d66869e82aa4

    • SHA256

      cc394faaa76b94227b8b1d982175c13a32b9529a88d422664daf18ad1f664945

    • SHA512

      a5fc933113ce275eaeb4fd1ef50cb271099fbf05f0b09800a2ada6494dc6c272006b461891dac2e37a67670a08529022d43bdf81e32265cc8baf895a8aa1e3e4

    • SSDEEP

      1536:9//+vex62dbPz7TL9xoBYrZboXWGBvlUlXtMHOfEAC5wKEPcOKAuu3F3M:9//+Wx62dbPz7TL9xlZboGGBvlUlXbuS

    Score
    9/10
    • Contacts a large (48320) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Loads a kernel module

      Loads a Linux kernel module, potentially to achieve persistence

MITRE ATT&CK Enterprise v15

Tasks