General
-
Target
00c89470fb482e3b70e3acbf906ec116
-
Size
87KB
-
Sample
231219-19t2vahga5
-
MD5
00c89470fb482e3b70e3acbf906ec116
-
SHA1
ce60ac7448e9dec233857b31f6fd4f1bea22ffb3
-
SHA256
be4c2c126c723f5b2fb8101b2e60da12dd15ab3905dc370b8eba1fd9df978977
-
SHA512
6fa5754bace9bb8dcab6dcc7ce06d200003b2527287a7d39a8c80127f935ea9cc06c84105e6a1a4b9ee22a7061c20190f8565ef2812fe07db93d011d96a4105d
-
SSDEEP
1536:1YRdsnDd6C6gb/ZVyDYjMbwqZ9b0vfwW9ufY1C+KBtyRirfXDOiOc3J:CHsnD8/gb/zyDv9b0HD9FC+KBtyR6/Dh
Behavioral task
behavioral1
Sample
00c89470fb482e3b70e3acbf906ec116
Resource
debian9-mipsbe-20231215-en
Malware Config
Extracted
mirai
LZRD
Targets
-
-
Target
00c89470fb482e3b70e3acbf906ec116
-
Size
87KB
-
MD5
00c89470fb482e3b70e3acbf906ec116
-
SHA1
ce60ac7448e9dec233857b31f6fd4f1bea22ffb3
-
SHA256
be4c2c126c723f5b2fb8101b2e60da12dd15ab3905dc370b8eba1fd9df978977
-
SHA512
6fa5754bace9bb8dcab6dcc7ce06d200003b2527287a7d39a8c80127f935ea9cc06c84105e6a1a4b9ee22a7061c20190f8565ef2812fe07db93d011d96a4105d
-
SSDEEP
1536:1YRdsnDd6C6gb/ZVyDYjMbwqZ9b0vfwW9ufY1C+KBtyRirfXDOiOc3J:CHsnD8/gb/zyDv9b0HD9FC+KBtyR6/Dh
Score9/10-
Contacts a large (20039) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Enumerates active TCP sockets
Gets active TCP sockets from /proc virtual filesystem.
-
Enumerates running processes
Discovers information about currently running processes on the system
-