General
-
Target
jklx86.elf
-
Size
61KB
-
Sample
230629-3v5k5sge21
-
MD5
af56a1d9928725bd58f6d5c32d059a89
-
SHA1
d44f103d1fb3f6f61207a5869f7fc48c2c8aecdd
-
SHA256
8d7fc020f22c5f6a3245ee348bfceed2edf8c50a1294401e3f44e95cac650d65
-
SHA512
65bddebbe0ad0c8837bf321fd80aff56ef44273683d96530268147536e8e579ecde03dc7fc4f5abbf83193cd6c6b134ad27b858364a60dda31eb6e538cc2caa2
-
SSDEEP
1536:MicZnAM0YGK4UV1tRGi7SQ3hfBis61sYou+Vk5Ddsx/Gvd3vvvvvvvvvvvvZYli:Mi0AM0YGK4M0i7r1B/ms+uklE/Gvd3vV
Behavioral task
behavioral1
Sample
jklx86.elf
Resource
ubuntu1804-amd64-20230621-en
Malware Config
Extracted
mirai
BOTNET
Targets
-
-
Target
jklx86.elf
-
Size
61KB
-
MD5
af56a1d9928725bd58f6d5c32d059a89
-
SHA1
d44f103d1fb3f6f61207a5869f7fc48c2c8aecdd
-
SHA256
8d7fc020f22c5f6a3245ee348bfceed2edf8c50a1294401e3f44e95cac650d65
-
SHA512
65bddebbe0ad0c8837bf321fd80aff56ef44273683d96530268147536e8e579ecde03dc7fc4f5abbf83193cd6c6b134ad27b858364a60dda31eb6e538cc2caa2
-
SSDEEP
1536:MicZnAM0YGK4UV1tRGi7SQ3hfBis61sYou+Vk5Ddsx/Gvd3vvvvvvvvvvvvZYli:Mi0AM0YGK4M0i7r1B/ms+uklE/Gvd3vV
Score9/10-
Contacts a large (139934) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Changes its process name
-
Deletes itself
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-