General
-
Target
d609cd7134f2cfaca36467b59286f02e.elf
-
Size
70KB
-
Sample
230505-qms6xsag73
-
MD5
d609cd7134f2cfaca36467b59286f02e
-
SHA1
0d95c3d939d21bfa4d1187d65d8822bc8be2932f
-
SHA256
e2aaad94d1933f4d4ec660731e1a4da5af2d4ef15d0ab8d8bb17ae82877ac3f4
-
SHA512
6ca6d4c97cd052c0f20892364db8b8e99134b2dda9b514413b663ceae7a2135341b94bd993394256ab59a32447888d0d3604f8739cf9c1543ad906d1502d0b63
-
SSDEEP
768:R5zzEInDLyzIx17vejtiKuTR/3pXQB5HbeDfeRZeCffDdxhdOXi2QyW38:R5nEwvyzIx5xx5ABhCfEZ1ffDdxPKW
Behavioral task
behavioral1
Sample
d609cd7134f2cfaca36467b59286f02e.elf
Resource
debian9-mipsel-en-20211208
Malware Config
Extracted
mirai
BOTNET
Targets
-
-
Target
d609cd7134f2cfaca36467b59286f02e.elf
-
Size
70KB
-
MD5
d609cd7134f2cfaca36467b59286f02e
-
SHA1
0d95c3d939d21bfa4d1187d65d8822bc8be2932f
-
SHA256
e2aaad94d1933f4d4ec660731e1a4da5af2d4ef15d0ab8d8bb17ae82877ac3f4
-
SHA512
6ca6d4c97cd052c0f20892364db8b8e99134b2dda9b514413b663ceae7a2135341b94bd993394256ab59a32447888d0d3604f8739cf9c1543ad906d1502d0b63
-
SSDEEP
768:R5zzEInDLyzIx17vejtiKuTR/3pXQB5HbeDfeRZeCffDdxhdOXi2QyW38:R5nEwvyzIx5xx5ABhCfEZ1ffDdxPKW
Score9/10-
Contacts a large (243068) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Modifies the Watchdog daemon
Malware like Mirai modify the Watchdog to prevent it restarting an infected system.
-
Changes its process name
-
Deletes itself
-
Reads runtime system information
Reads data from /proc virtual filesystem.
-