General
-
Target
1e52f26a8ce8a4b558a9b9dc1a1dbcf1
-
Size
62KB
-
Sample
231219-2l43ksbchp
-
MD5
1e52f26a8ce8a4b558a9b9dc1a1dbcf1
-
SHA1
d5023f2957929d566493cec5384a56f1258ed332
-
SHA256
ae9054dca6078dbee9e52f36188d41fec20341b0cce465d0f507f9fd9ada94a0
-
SHA512
84336a7de6e84cdc36661a4757449866aefe2e9c24ecf192a1371707e7cae617646b52c9e37ca017c72be6ea2c9c617714cf4bbd7ece3c67ff6e0b1fdf8e22d6
-
SSDEEP
1536:vP+V4YPpVLkTkQhhg5gr64+sbPeZW06t6eos:vP+4YEAv4lbPwF6V
Behavioral task
behavioral1
Sample
1e52f26a8ce8a4b558a9b9dc1a1dbcf1
Resource
debian9-armhf-20231215-en
Malware Config
Extracted
mirai
LZRD
Targets
-
-
Target
1e52f26a8ce8a4b558a9b9dc1a1dbcf1
-
Size
62KB
-
MD5
1e52f26a8ce8a4b558a9b9dc1a1dbcf1
-
SHA1
d5023f2957929d566493cec5384a56f1258ed332
-
SHA256
ae9054dca6078dbee9e52f36188d41fec20341b0cce465d0f507f9fd9ada94a0
-
SHA512
84336a7de6e84cdc36661a4757449866aefe2e9c24ecf192a1371707e7cae617646b52c9e37ca017c72be6ea2c9c617714cf4bbd7ece3c67ff6e0b1fdf8e22d6
-
SSDEEP
1536:vP+V4YPpVLkTkQhhg5gr64+sbPeZW06t6eos:vP+4YEAv4lbPwF6V
Score9/10-
Contacts a large (81998) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Enumerates active TCP sockets
Gets active TCP sockets from /proc virtual filesystem.
-
Enumerates running processes
Discovers information about currently running processes on the system
-