General
-
Target
110b9c4df6a774b547fe6261df6f7640.bin
-
Size
28KB
-
Sample
230510-bf6q4sfe5s
-
MD5
2977f43392fb8b0d9c8b74b89b1cb140
-
SHA1
c96d6ea36c9a35b508295a1432b7ff6ee3107be1
-
SHA256
e399f1177cf0be303340033c32375f04696c66ee104933aba0de999b5624db15
-
SHA512
8866bec524cbcb9fe08390ac55e873a83f6857040e74a4e7f09f474fc9fe8221927d5894110faf136557e9163a80b387367f21b797e20d1710e95e625cc3a5f1
-
SSDEEP
768:sGHnmrZegi5aegV6/liTLuVFRHl2Fb/Req6:ZKj+1liPu5FcbEq6
Malware Config
Extracted
mirai
BOTNET
pachoisgay.3utilities.com
Targets
-
-
Target
86d15c6595bf8318ce2e0ca46727a8dca0c604d3114e1bbc089b8eea67c046eb.elf
-
Size
28KB
-
MD5
110b9c4df6a774b547fe6261df6f7640
-
SHA1
0594b221c18a6e313d636276c5d026bd5cd0f3fa
-
SHA256
86d15c6595bf8318ce2e0ca46727a8dca0c604d3114e1bbc089b8eea67c046eb
-
SHA512
d89162499cc6bf7d566781ce3216af32605b0fb8ba6ad0ceabaef4c3315b4245404f8171ee38a2d219dcb05df3db023d39e2f170a03ab35e06a6c69645ae5786
-
SSDEEP
768:LhAP7JIINnYOEzJgMoojL+xexp3e/e3RZ+dImO+o1sI:iNHNY30ouEhemhcdW1qI
-
Contacts a large (109770) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Modifies the Watchdog daemon
Malware like Mirai modify the Watchdog to prevent it restarting an infected system.
-
Changes its process name
-
Reads runtime system information
Reads data from /proc virtual filesystem.
-