General
-
Target
588-1-0x0000000008048000-0x0000000008062e00-memory.dmp
-
Size
96KB
-
Sample
230703-f2njwaga8z
-
MD5
0aa1bd913457d5fdad0f77c6a7396dc5
-
SHA1
86670992a0aeeeb3f1c0541b6a618857cfce5809
-
SHA256
ffbf2661c3e52e2255f21d90a79b7ea5487d1bee5f62a9acb22bb2ce86dcdd3e
-
SHA512
7cda88557f5cbbe14d29a7d429a34097623484e12ca85064eadc3f2364b0a512607f1d5c587eba8101c3af88da758ccb449d0a6c0d32c781c9bce5ecfe6f3c4b
-
SSDEEP
3072:088NimXbdys1IqueknrV63kFh5DjOCQgRSWEN/3zG9wqx1r9H:08CiKbd/uqu/rVckFh5D9QAQvYpH
Behavioral task
behavioral1
Sample
588-1-0x0000000008048000-0x0000000008062e00-memory.dmp
Resource
ubuntu1804-amd64-20230621-en
Malware Config
Extracted
mirai
YOWAI
Targets
-
-
Target
588-1-0x0000000008048000-0x0000000008062e00-memory.dmp
-
Size
96KB
-
MD5
0aa1bd913457d5fdad0f77c6a7396dc5
-
SHA1
86670992a0aeeeb3f1c0541b6a618857cfce5809
-
SHA256
ffbf2661c3e52e2255f21d90a79b7ea5487d1bee5f62a9acb22bb2ce86dcdd3e
-
SHA512
7cda88557f5cbbe14d29a7d429a34097623484e12ca85064eadc3f2364b0a512607f1d5c587eba8101c3af88da758ccb449d0a6c0d32c781c9bce5ecfe6f3c4b
-
SSDEEP
3072:088NimXbdys1IqueknrV63kFh5DjOCQgRSWEN/3zG9wqx1r9H:08CiKbd/uqu/rVckFh5D9QAQvYpH
Score9/10-
Contacts a large (20602) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Enumerates active TCP sockets
Gets active TCP sockets from /proc virtual filesystem.
-
Enumerates running processes
Discovers information about currently running processes on the system
-