General
-
Target
Linux.Mirai.B.zip
-
Size
178KB
-
Sample
230907-pmkn4she9z
-
MD5
23282f4301170e8ee3b157dcfaae6317
-
SHA1
a70f312adc8777dfb6d8d64c280b3405b4f52717
-
SHA256
b50681094c040883f3da8fe697bd3a9e35e62d1672f59d9f14e0db494f9d41c2
-
SHA512
c35ae449b81564a23fc1148d3514c72dbb0bd2b0cd3faee10765c24f9255ad9f7576fe37c94ce20893a3022ea3c124e49e3e4c09ac9f44a78ae1ac6fd6ae0460
-
SSDEEP
3072:IcefSi+fw324VkAIOnRmPttnei+2kKPvJujb/qbsLoVeuvRuXY2m:Iefw324VrB6yE5wSbsL1uqzm
Behavioral task
behavioral1
Sample
03254e6240c35f7d787ca5175ffc36818185e62bdfc4d88d5b342451a747156d
Resource
debian9-armhf-20230831-en
Behavioral task
behavioral2
Sample
f60b29cfb7eab3aeb391f46e94d4d8efadde5498583a2f5c71bd8212d8ae92da
Resource
debian9-armhf-20230831-en
Malware Config
Extracted
mirai
SORA
Targets
-
-
Target
03254e6240c35f7d787ca5175ffc36818185e62bdfc4d88d5b342451a747156d
-
Size
175KB
-
MD5
390f1382237b5a01dd46bf1404c223e7
-
SHA1
28976d0de5260fcdc620240bbad78424addd6232
-
SHA256
03254e6240c35f7d787ca5175ffc36818185e62bdfc4d88d5b342451a747156d
-
SHA512
ea2104284eb5efceade8400c2b57a34758f7507b0de4745cfab88d0f4f91222bf1f3ff9ba72912f48d53c22d87dca0600f54817de048ffe41bad8552e33bf339
-
SSDEEP
3072:yOCadKI8clvfc0rXCMf4ZaxOQy+Ejhk/5UMllWWOcNuM/9ad4xofaZRK0mGHdNi6:/CadKI8c+bxZaxOQy+ehlMlYWOcAM/91
Score1/10 -
-
-
Target
f60b29cfb7eab3aeb391f46e94d4d8efadde5498583a2f5c71bd8212d8ae92da
-
Size
276KB
-
MD5
9a6e4b8a6ba5b4f5a408919d2c169d92
-
SHA1
9b8523cbf0f3af49dbb1680d53c8fc9b2782bcfc
-
SHA256
f60b29cfb7eab3aeb391f46e94d4d8efadde5498583a2f5c71bd8212d8ae92da
-
SHA512
d5fd2334772c18729790ec25b5e3c0ace6353aaa853f60d7e55b13f9b88f49e1dec294c303abc3877894ee8a492fdd1d6a0b951405f1f5a021280ff1c1800670
-
SSDEEP
6144:XkYUAmEjloym0V80hkRocENCP0RnYtGSoBmb4d3PCBElKb/0FaiFsXWxATqtEvcM:XkYUAmEjloym0V80hkRo/NCP0RnYtGSj
Score9/10-
Contacts a large (36488) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Changes its process name
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Enumerates running processes
Discovers information about currently running processes on the system
-