General
-
Target
3b87ddf5b7d666aab721e8c7e0e69584
-
Size
97KB
-
Sample
231219-2yy24agccn
-
MD5
3b87ddf5b7d666aab721e8c7e0e69584
-
SHA1
f6752645245bfaa2eb9ba886f69bcef598c01165
-
SHA256
1fe454c1218581d2c43e4e0bc2f9c2c87364c56c3fbec4e9c25c32125a43f3fe
-
SHA512
092ecfc68cc156c77c2e7e5d9b25169d4f8a0114e591d8f7d6a5d62b405a7393a9a74c2a5e580974792b43428d327df4807c879bf67403d667bfc4e4d8181171
-
SSDEEP
3072:QH4TN5B2d0mdeSlggUwCujychm1u5mzX3nycw69geZ/UsdFky7:QHWjwSqpSgUwCujychm1u5mzXXumzdFT
Behavioral task
behavioral1
Sample
3b87ddf5b7d666aab721e8c7e0e69584
Resource
ubuntu1804-amd64-20231215-en
Malware Config
Extracted
mirai
LZRD
Targets
-
-
Target
3b87ddf5b7d666aab721e8c7e0e69584
-
Size
97KB
-
MD5
3b87ddf5b7d666aab721e8c7e0e69584
-
SHA1
f6752645245bfaa2eb9ba886f69bcef598c01165
-
SHA256
1fe454c1218581d2c43e4e0bc2f9c2c87364c56c3fbec4e9c25c32125a43f3fe
-
SHA512
092ecfc68cc156c77c2e7e5d9b25169d4f8a0114e591d8f7d6a5d62b405a7393a9a74c2a5e580974792b43428d327df4807c879bf67403d667bfc4e4d8181171
-
SSDEEP
3072:QH4TN5B2d0mdeSlggUwCujychm1u5mzX3nycw69geZ/UsdFky7:QHWjwSqpSgUwCujychm1u5mzXXumzdFT
Score9/10-
Contacts a large (36404) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Enumerates active TCP sockets
Gets active TCP sockets from /proc virtual filesystem.
-
Enumerates running processes
Discovers information about currently running processes on the system
-