General
-
Target
22236418d66d092a868814a050662cb6.bin
-
Size
40KB
-
Sample
230203-j5gsaagd5y
-
MD5
5761f6ada99f7618e114b0fd5da1afd9
-
SHA1
ed26e11e40faaa4b94dc9ab246c404bc60fbe4c9
-
SHA256
9cfcbd1dbd072cc821a370f649d46d86b371f767bf7a3ac152f00c0c597fc002
-
SHA512
4864bb3f83e44007c04ed5f44c9b021966b70949d9554f9424533baa1ac3bb9acc161e94202d7009b090999aacf5693e1d9e53a1f07cef897c464ac63b8b4483
-
SSDEEP
768:MvXXJphvzwVi20c8Ij2aS2z/35VeLXZGHUNpmmChNEieFWV8ViD7+4P/pq7r1Ifk:wX5nkVi3c1S2DJVeLSUAAVoi45Kqk
Behavioral task
behavioral1
Sample
ebab385a00e909ff7748edeecf15ffceba7748e9b0f9850142fe7ef8d5ed5ffe.elf
Resource
debian9-mipsbe-20221111-en
Malware Config
Extracted
mirai
BOTNET
Targets
-
-
Target
ebab385a00e909ff7748edeecf15ffceba7748e9b0f9850142fe7ef8d5ed5ffe.elf
-
Size
95KB
-
MD5
22236418d66d092a868814a050662cb6
-
SHA1
0bf047cdeb6ce406a32e0c305a2b9089c9e369c3
-
SHA256
ebab385a00e909ff7748edeecf15ffceba7748e9b0f9850142fe7ef8d5ed5ffe
-
SHA512
4b96f8ec59c601c8f880968beeabf4c617235518f6ad8a1091e22beb6494cc03bf81730f9bce6d7bda7ceb0ef963a3b9f4ec923711f07a1be4e55e5588255a0e
-
SSDEEP
1536:+DdgrUgifAhAWUq1gt4h/m4iXGmLl5yDiywPveFpZNzJ:sgr7iIhymO4ajIiywPEDzJ
Score9/10-
Contacts a large (290975) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Modifies the Watchdog daemon
Malware like Mirai modify the Watchdog to prevent it restarting an infected system.
-
Reads runtime system information
Reads data from /proc virtual filesystem.
-
Writes file to tmp directory
Malware often drops required files in the /tmp directory.
-