General
-
Target
110b9c4df6a774b547fe6261df6f7640.elf
-
Size
28KB
-
Sample
230508-vqvalsde5w
-
MD5
110b9c4df6a774b547fe6261df6f7640
-
SHA1
0594b221c18a6e313d636276c5d026bd5cd0f3fa
-
SHA256
86d15c6595bf8318ce2e0ca46727a8dca0c604d3114e1bbc089b8eea67c046eb
-
SHA512
d89162499cc6bf7d566781ce3216af32605b0fb8ba6ad0ceabaef4c3315b4245404f8171ee38a2d219dcb05df3db023d39e2f170a03ab35e06a6c69645ae5786
-
SSDEEP
768:LhAP7JIINnYOEzJgMoojL+xexp3e/e3RZ+dImO+o1sI:iNHNY30ouEhemhcdW1qI
Malware Config
Extracted
mirai
BOTNET
pachoisgay.3utilities.com
Targets
-
-
Target
110b9c4df6a774b547fe6261df6f7640.elf
-
Size
28KB
-
MD5
110b9c4df6a774b547fe6261df6f7640
-
SHA1
0594b221c18a6e313d636276c5d026bd5cd0f3fa
-
SHA256
86d15c6595bf8318ce2e0ca46727a8dca0c604d3114e1bbc089b8eea67c046eb
-
SHA512
d89162499cc6bf7d566781ce3216af32605b0fb8ba6ad0ceabaef4c3315b4245404f8171ee38a2d219dcb05df3db023d39e2f170a03ab35e06a6c69645ae5786
-
SSDEEP
768:LhAP7JIINnYOEzJgMoojL+xexp3e/e3RZ+dImO+o1sI:iNHNY30ouEhemhcdW1qI
-
Contacts a large (110789) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Modifies the Watchdog daemon
Malware like Mirai modify the Watchdog to prevent it restarting an infected system.
-
Changes its process name
-
Reads runtime system information
Reads data from /proc virtual filesystem.
-