General
-
Target
a8d3af50def78d8173e8aecc1e96eea3.bin
-
Size
89KB
-
Sample
230607-c1sknahb31
-
MD5
6b2bf66274f1cfbce3493850a35afda5
-
SHA1
e8ec41b94d11f5b8b6b25f1e2f3fb7877227cc33
-
SHA256
672e5151382326391dc17823fa960311d26d4fda693b6c3476f556948d53de59
-
SHA512
1a2e1e764de33c90fe55d9dbf7348ba0cfda8edcce1d1335e79ee4159e10d616787e67dd42d7bc21eb8f7fcf4d7405d262f296be894e5cf6353054f6a7e8068e
-
SSDEEP
1536:9QZEDlHQrZ98uyE3ZOG1R6tCXe20CkwC/gzy1thLByD7SbSvBoTAHupO9L:yWZwd98NE38jUXzkwC/gzODLBuSeaAu6
Behavioral task
behavioral1
Sample
fa68279f6cf4262aa45321c9a4d882845318d67458761cf2439e1e3244b34184.elf
Resource
debian9-armhf-20221111-en
Malware Config
Extracted
mirai
LZRD
Targets
-
-
Target
fa68279f6cf4262aa45321c9a4d882845318d67458761cf2439e1e3244b34184.elf
-
Size
263KB
-
MD5
a8d3af50def78d8173e8aecc1e96eea3
-
SHA1
e7ee9eee70ae398eafc2f254b7bbfc7a1af81df7
-
SHA256
fa68279f6cf4262aa45321c9a4d882845318d67458761cf2439e1e3244b34184
-
SHA512
650b464193c8ee0791bfd7eb20a3f0491d3642a178fc1ebb7f6031cf60ad79c87838ee554cf784518921a18ee351986b33cb5d9e2e05fd6bfe4a0c5cb04dcc79
-
SSDEEP
6144:pMtDF16WglC1RbRcZQaC9mrsplDKZUfQBKXAVantX+F8Jyvp1G6xxn4J+fBhrild:pMtDF16WgQUo9mrsplDKZ2QBKXAVantz
Score9/10-
Contacts a large (18953) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Enumerates active TCP sockets
Gets active TCP sockets from /proc virtual filesystem.
-
Enumerates running processes
Discovers information about currently running processes on the system
-