General
-
Target
z3hir.x86.elf
-
Size
29KB
-
Sample
230901-1qgbmsaa3z
-
MD5
040ca4bffcffe7f53707e83f467786a9
-
SHA1
df6cfa39336c5e5d6d9bea647be52e697a2bb53a
-
SHA256
2243519315b67ece4532963a7a560392ae45fa69dc792dfa95b6770ee8db6758
-
SHA512
6cac7041461e4407c26f8a3552dff6ded18517c2522deccc6c92bd4226a0a277c157666315549daf047031f44ba843d691dcd8ebe12381c9c8e9743f0ac39dad
-
SSDEEP
768:WN8f6tfoQmQAXV7E1QDvjnVjA2mCT6oqq:2MJXFl7IQjGAn
Malware Config
Extracted
mirai
UNST
Targets
-
-
Target
z3hir.x86.elf
-
Size
29KB
-
MD5
040ca4bffcffe7f53707e83f467786a9
-
SHA1
df6cfa39336c5e5d6d9bea647be52e697a2bb53a
-
SHA256
2243519315b67ece4532963a7a560392ae45fa69dc792dfa95b6770ee8db6758
-
SHA512
6cac7041461e4407c26f8a3552dff6ded18517c2522deccc6c92bd4226a0a277c157666315549daf047031f44ba843d691dcd8ebe12381c9c8e9743f0ac39dad
-
SSDEEP
768:WN8f6tfoQmQAXV7E1QDvjnVjA2mCT6oqq:2MJXFl7IQjGAn
-
Contacts a large (20686) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Enumerates active TCP sockets
Gets active TCP sockets from /proc virtual filesystem.
-
Enumerates running processes
Discovers information about currently running processes on the system
-