General
-
Target
ff801776924f351329285cceb1fccc49.bin
-
Size
28KB
-
Sample
230510-cn6lradh65
-
MD5
aa17fa7ea9a1e726019817a4d210c270
-
SHA1
f6d9834f43c5450738670a4694df8c539e856f58
-
SHA256
34f15ca016c0828abd7c95e0a11e93b00cdf071f480f81896aa8eeff5b8cf3b8
-
SHA512
71ac40f5351a14b3bd1ef787576509de316f40a076f6b49f56052121e689ccd2408114bf03f51eae42ab68b8275be6fad9ec3eb030ee81565070fc20d7aae26f
-
SSDEEP
768:RGgiKgngp9uDJS8OAadrs9udnRxqCHmV1ShBAkOG:RQgpA08kd0u1mCHmVAh2kD
Malware Config
Extracted
mirai
BOTNET
Targets
-
-
Target
0b47ff4950be491f52ab488974c5c2d129a3e26b76291620e13a90660c5789e8.elf
-
Size
29KB
-
MD5
ff801776924f351329285cceb1fccc49
-
SHA1
beb5c81f951abd667a157c5090c1514a890a793f
-
SHA256
0b47ff4950be491f52ab488974c5c2d129a3e26b76291620e13a90660c5789e8
-
SHA512
ff6b6d5c1cc3b99ed2be0143a5fedca26ec6629952286c73b8d26da9fb03264d375df73f6bc5ac7c75a7963e543c05d3b569f1afeff93263ba46808bc691a60d
-
SSDEEP
768:qpP5brCsdTo7R0dxdR3cTk3cpvmXcSKSzEbs9fvxWy:qpP1JW10dWk3ivmMSDBl
-
Contacts a large (100848) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Modifies the Watchdog daemon
Malware like Mirai modify the Watchdog to prevent it restarting an infected system.
-
Changes its process name
-
Reads runtime system information
Reads data from /proc virtual filesystem.
-