General
-
Target
0f9cebbd9a3e151eba82afed6813c6a0
-
Size
26KB
-
Sample
231219-2ff4kaghhr
-
MD5
0f9cebbd9a3e151eba82afed6813c6a0
-
SHA1
56b62b14e5f4a4bfa9187d515327e9fd689477f2
-
SHA256
4275bd795b276f5e2a46b397aa094c782a18b20b18aafdf996209be9a8731489
-
SHA512
59561e6baa31ea1b4457ca59737d1451762a63922a972700cc5e23607ac100adc148a77fe4f6a191683d4292e2529f4b4d990c2e3edc11bcf53ace76da7661f8
-
SSDEEP
768:/MCUb8u0YGOSuEZV1/FuZ5l1/BoIcC0TuG6s7oKs3Uozq:EVDJKz1/6lZBBcC0tEHzq
Malware Config
Extracted
mirai
LZRD
Targets
-
-
Target
0f9cebbd9a3e151eba82afed6813c6a0
-
Size
26KB
-
MD5
0f9cebbd9a3e151eba82afed6813c6a0
-
SHA1
56b62b14e5f4a4bfa9187d515327e9fd689477f2
-
SHA256
4275bd795b276f5e2a46b397aa094c782a18b20b18aafdf996209be9a8731489
-
SHA512
59561e6baa31ea1b4457ca59737d1451762a63922a972700cc5e23607ac100adc148a77fe4f6a191683d4292e2529f4b4d990c2e3edc11bcf53ace76da7661f8
-
SSDEEP
768:/MCUb8u0YGOSuEZV1/FuZ5l1/BoIcC0TuG6s7oKs3Uozq:EVDJKz1/6lZBBcC0tEHzq
-
Contacts a large (20314) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Enumerates active TCP sockets
Gets active TCP sockets from /proc virtual filesystem.
-
Enumerates running processes
Discovers information about currently running processes on the system
-