General
-
Target
0e41155a66c810f30fa2cef1a57ba3d1
-
Size
89KB
-
Sample
231219-2evwbsbhc2
-
MD5
0e41155a66c810f30fa2cef1a57ba3d1
-
SHA1
f2c7c8120c89832f94ef86f8b91d1ea5eba688fc
-
SHA256
9f483a1f4ce3220e3ae7c227d67ab1026c405ce668e90983de2e1ef4bf45e610
-
SHA512
c4379f5c84d0bdd0997698cbae4be491bb6372c9dd5b1c303073964b1edbca04a3f17a23aa9dae805d10b142cd978b1ca04e340d65a23d335cc483e311f363dc
-
SSDEEP
1536:NYCYxrXP40ODyPwHRQ9PlzTRfyToNoZqEi:qCYxrKDy46Nx
Behavioral task
behavioral1
Sample
0e41155a66c810f30fa2cef1a57ba3d1
Resource
debian9-mipsel-20231215-en
Malware Config
Extracted
mirai
LZRD
Targets
-
-
Target
0e41155a66c810f30fa2cef1a57ba3d1
-
Size
89KB
-
MD5
0e41155a66c810f30fa2cef1a57ba3d1
-
SHA1
f2c7c8120c89832f94ef86f8b91d1ea5eba688fc
-
SHA256
9f483a1f4ce3220e3ae7c227d67ab1026c405ce668e90983de2e1ef4bf45e610
-
SHA512
c4379f5c84d0bdd0997698cbae4be491bb6372c9dd5b1c303073964b1edbca04a3f17a23aa9dae805d10b142cd978b1ca04e340d65a23d335cc483e311f363dc
-
SSDEEP
1536:NYCYxrXP40ODyPwHRQ9PlzTRfyToNoZqEi:qCYxrKDy46Nx
Score9/10-
Contacts a large (20138) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Enumerates active TCP sockets
Gets active TCP sockets from /proc virtual filesystem.
-
Enumerates running processes
Discovers information about currently running processes on the system
-