General
-
Target
7d61efa74d58f761f515d7b38ca0ce70.elf
-
Size
86KB
-
Sample
231116-hhgnbshc61
-
MD5
7d61efa74d58f761f515d7b38ca0ce70
-
SHA1
90fbede315411be1976c1c23f796e0cd8958e859
-
SHA256
a66187d7ea91ec73d6f3d8009aa12d6c59c49fe119740cdf7febcc39ddf13c63
-
SHA512
aeb6e58ad96ed5e5c16b9988642b9e640791d6d74bb26c0e190ea7a2e6cc88c4dc99a22610952a24b752db65ef97f5b7ef15fd0ce30bda6fbd6091c744abeff8
-
SSDEEP
1536:rodt3VzfKg4Sf1fPuw/uu9PLp98GfjHghP1q5Tpm:roz3Vz9f1fPZ9mhi
Behavioral task
behavioral1
Sample
7d61efa74d58f761f515d7b38ca0ce70.elf
Resource
debian9-mipsel-20231026-en
Malware Config
Extracted
mirai
LZRD
Targets
-
-
Target
7d61efa74d58f761f515d7b38ca0ce70.elf
-
Size
86KB
-
MD5
7d61efa74d58f761f515d7b38ca0ce70
-
SHA1
90fbede315411be1976c1c23f796e0cd8958e859
-
SHA256
a66187d7ea91ec73d6f3d8009aa12d6c59c49fe119740cdf7febcc39ddf13c63
-
SHA512
aeb6e58ad96ed5e5c16b9988642b9e640791d6d74bb26c0e190ea7a2e6cc88c4dc99a22610952a24b752db65ef97f5b7ef15fd0ce30bda6fbd6091c744abeff8
-
SSDEEP
1536:rodt3VzfKg4Sf1fPuw/uu9PLp98GfjHghP1q5Tpm:roz3Vz9f1fPZ9mhi
Score9/10-
Contacts a large (19033) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Enumerates active TCP sockets
Gets active TCP sockets from /proc virtual filesystem.
-
Enumerates running processes
Discovers information about currently running processes on the system
-