General
-
Target
0226813a4ed1d5d74e68f31466d182ea.elf
-
Size
38KB
-
Sample
230428-n5qseaff8x
-
MD5
0226813a4ed1d5d74e68f31466d182ea
-
SHA1
da148582ccefa8e5b29dfcf3e8c3cb1a6d297268
-
SHA256
c3452095c03d2e459fe12ee1a3dfb7b4f5d7b164d2d952d7426f7e0354c28821
-
SHA512
24b187afe7a76e79ffc233ed59e06b97dbe280330860c14af2460e961b52a563520888d1bb3dee0644d7cc300204b16bd8baea714b3c989c39e5a6df3faad496
-
SSDEEP
768:cu+dhF07mTlV27W5Ecvki/O09a8pvoQDsmwcA2gtqfLJYWRK:c1jZlV2qOx8t6y4
Static task
static1
Malware Config
Extracted
mirai
KYTON
Targets
-
-
Target
0226813a4ed1d5d74e68f31466d182ea.elf
-
Size
38KB
-
MD5
0226813a4ed1d5d74e68f31466d182ea
-
SHA1
da148582ccefa8e5b29dfcf3e8c3cb1a6d297268
-
SHA256
c3452095c03d2e459fe12ee1a3dfb7b4f5d7b164d2d952d7426f7e0354c28821
-
SHA512
24b187afe7a76e79ffc233ed59e06b97dbe280330860c14af2460e961b52a563520888d1bb3dee0644d7cc300204b16bd8baea714b3c989c39e5a6df3faad496
-
SSDEEP
768:cu+dhF07mTlV27W5Ecvki/O09a8pvoQDsmwcA2gtqfLJYWRK:c1jZlV2qOx8t6y4
-
Contacts a large (91470) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Modifies the Watchdog daemon
Malware like Mirai modify the Watchdog to prevent it restarting an infected system.
-
Writes file to system bin folder
-
Changes its process name
-
Enumerates active TCP sockets
Gets active TCP sockets from /proc virtual filesystem.
-
Reads system network configuration
Uses contents of /proc filesystem to enumerate network settings.
-
Reads runtime system information
Reads data from /proc virtual filesystem.
-