General
-
Target
bdc77afda6b9fc1d82ca1a0750b3e1dc.elf
-
Size
133KB
-
Sample
230606-2bxwhsfh88
-
MD5
bdc77afda6b9fc1d82ca1a0750b3e1dc
-
SHA1
9859792e4f0ef2d18f4977ca8b690f46ff08e8f1
-
SHA256
432e01a3d3a989e847fa25458ed4aecb610f1983f868474b8d2816f7a08f5c5c
-
SHA512
d08007faa522f6f75bd105bad9cf498aab792aaad928cdc0e6bfc735bf7369b67649240a2163ec8ac19e693a6247d0c55462000bea97debc3f4eafa1150823b2
-
SSDEEP
3072:IIrDhJl8rkne9XVbe5YjsZgK/BPPY2pWZU97Yz1OoM/9BjUG6:ZrDhJl8rBS5MagK/BPwqWeuz1dM/9Bj+
Behavioral task
behavioral1
Sample
bdc77afda6b9fc1d82ca1a0750b3e1dc.elf
Resource
debian9-armhf-en-20211208
Malware Config
Extracted
mirai
BOTNET
Targets
-
-
Target
bdc77afda6b9fc1d82ca1a0750b3e1dc.elf
-
Size
133KB
-
MD5
bdc77afda6b9fc1d82ca1a0750b3e1dc
-
SHA1
9859792e4f0ef2d18f4977ca8b690f46ff08e8f1
-
SHA256
432e01a3d3a989e847fa25458ed4aecb610f1983f868474b8d2816f7a08f5c5c
-
SHA512
d08007faa522f6f75bd105bad9cf498aab792aaad928cdc0e6bfc735bf7369b67649240a2163ec8ac19e693a6247d0c55462000bea97debc3f4eafa1150823b2
-
SSDEEP
3072:IIrDhJl8rkne9XVbe5YjsZgK/BPPY2pWZU97Yz1OoM/9BjUG6:ZrDhJl8rBS5MagK/BPwqWeuz1dM/9Bj+
Score9/10-
Contacts a large (94423) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Changes its process name
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Enumerates running processes
Discovers information about currently running processes on the system
-