General
-
Target
62253f31b0209e8f31107ff0f2e883a3.bin
-
Size
28KB
-
Sample
230711-l4t3bsgb88
-
MD5
12cf07deffe9e1dcb78e66923a22a76c
-
SHA1
6a003ab970dd2b1f9c68978737b42e3b49f460b3
-
SHA256
62f7d3d602bfe786ac7b6a0c1e2f0dd31724967c916ff7e181b6dd55f3953870
-
SHA512
bf8a1f154ba0854c1f9767f43a7080ade2b897ab8d769a28403457527dbd31eeee8ada1e2cca9a88e088bad4067f0c4c1dcd42fce31b48fe4ec0b6f807ae4889
-
SSDEEP
768:tB9BXZG7mmm+YozOpG9fIGA4FQ2/RN7xFixN:ti7mGOpG9fIGA4FFN7CN
Malware Config
Extracted
mirai
LZRD
Targets
-
-
Target
1ef35cf4d385f2b4ae890dfa21ff6aea2b6d629e1bc50e10dcd994941a2ab592.elf
-
Size
29KB
-
MD5
62253f31b0209e8f31107ff0f2e883a3
-
SHA1
0732440a2db266a71bfc080d3e1178140315f0c1
-
SHA256
1ef35cf4d385f2b4ae890dfa21ff6aea2b6d629e1bc50e10dcd994941a2ab592
-
SHA512
3268e2ffec79e6851fbc56e1cbd84e4ab716aa2f900715ccae529e6a69d09855f22b9750156f27eeb12910b2a8da67178eddcbdd1317a1c8d59d353ae24b4890
-
SSDEEP
768:3N8f6tfoQmQAXV7E1QDvjnVAiSZd8H0GuOZk3RuOQqS:9MJXFl7IQjU6uwB
-
Contacts a large (20604) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Enumerates active TCP sockets
Gets active TCP sockets from /proc virtual filesystem.
-
Enumerates running processes
Discovers information about currently running processes on the system
-