General
-
Target
cf4261cce32c80773e92315fc754eaa1.bin
-
Size
34KB
-
Sample
230724-c7grqshf78
-
MD5
d38ae51aa8d501be02b249e6f0dd6e12
-
SHA1
8d903a4c61bed8e926036cff72cd6d34d70b55a1
-
SHA256
7621d1608c7e155bfd23dec8b8adf710ce30d0304e1e0a3c2240b6338ac098fe
-
SHA512
3297186329f2bb3c9697cc0f575ee876200ccdb7dd386003fac19ecd44dc4d39c68ea6d963005e08e0e49476efbe5e7dfdce69cc2079e368472a9900b3516793
-
SSDEEP
768:MWJDtEW5OZc7Cl1cp3QMPdR0Sfbqam0yPQBBatyvFoY4:PtXILl1/MrZNBaYdoY4
Behavioral task
behavioral1
Sample
c668ac6a5d75b41a3d9b3f0d23290fe9c41690043fa3cd533ee1c44b30c250c8.elf
Resource
ubuntu1804-amd64-20230621-en
Malware Config
Extracted
mirai
BOTNET
cnc.powerfull-skid.com
Targets
-
-
Target
c668ac6a5d75b41a3d9b3f0d23290fe9c41690043fa3cd533ee1c44b30c250c8.elf
-
Size
73KB
-
MD5
cf4261cce32c80773e92315fc754eaa1
-
SHA1
ab0f31a66c0da8500e3e5a47aff9ff0291c79c6e
-
SHA256
c668ac6a5d75b41a3d9b3f0d23290fe9c41690043fa3cd533ee1c44b30c250c8
-
SHA512
b9b29941a5cbe1a906191053c8e9e0b20f6b292462b2f511f29cf5b2fc5a033d77e86c58ecf30b448c8289ec71b360aceb1a0efe9f638649dd76b1d6651b329d
-
SSDEEP
1536:adObTH6V6vLoPzIgmRRG3daxhMpWhADv5o4W2UEGGFtRrbaiFhnh9lqP:xHyCLo7I/7G3WhMpWhAr5oMvVbFhnh94
Score9/10-
Contacts a large (113613) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Changes its process name
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Enumerates running processes
Discovers information about currently running processes on the system
-