General
-
Target
27f8efe725fb96c0aeb174a4bcaaa254
-
Size
61KB
-
Sample
230216-hkfh2sgc83
-
MD5
27f8efe725fb96c0aeb174a4bcaaa254
-
SHA1
ce6efd93ba423a2af8529d05878352dbbb7b5a2f
-
SHA256
ef0ed2712cc3175cd5ee84f799b50f6a3f7b4cd9147885b578e9a462187fb64d
-
SHA512
da6456b1f301e1de55dfba91d024b0a5e2455cf46b8093fd87d063321a6db8a45e73408f0e22b43bc0cd1e2f6c03ef4ee612d1cbffaff7d7f1de2ec978216a3e
-
SSDEEP
1536:Uo2rxJ7IXR4Wg+0bnzezZlzXPCuWgJOLLK++bB32CzXXXXXXXXXXXXXXGVXXXXX/:0rDMXR/glnz09XKuLcG+akCzXXXXXXXc
Behavioral task
behavioral1
Sample
27f8efe725fb96c0aeb174a4bcaaa254
Resource
ubuntu1804-amd64-20221111-en
Malware Config
Extracted
mirai
PEDO
cnc.tightass.cc
sss.tightass.cc
Targets
-
-
Target
27f8efe725fb96c0aeb174a4bcaaa254
-
Size
61KB
-
MD5
27f8efe725fb96c0aeb174a4bcaaa254
-
SHA1
ce6efd93ba423a2af8529d05878352dbbb7b5a2f
-
SHA256
ef0ed2712cc3175cd5ee84f799b50f6a3f7b4cd9147885b578e9a462187fb64d
-
SHA512
da6456b1f301e1de55dfba91d024b0a5e2455cf46b8093fd87d063321a6db8a45e73408f0e22b43bc0cd1e2f6c03ef4ee612d1cbffaff7d7f1de2ec978216a3e
-
SSDEEP
1536:Uo2rxJ7IXR4Wg+0bnzezZlzXPCuWgJOLLK++bB32CzXXXXXXXXXXXXXXGVXXXXX/:0rDMXR/glnz09XKuLcG+akCzXXXXXXXc
Score9/10-
Contacts a large (76744) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Writes file to tmp directory
Malware often drops required files in the /tmp directory.
-