General
-
Target
5ee781c11a0a34c5ef0fd481df91239f
-
Size
64KB
-
Sample
231219-3cvcfshbd2
-
MD5
5ee781c11a0a34c5ef0fd481df91239f
-
SHA1
fa7b6d4ddc96b1209a7b2e7c77f12c16223257d9
-
SHA256
a9d1f056bea89bce9964d8c7788e727ca77888bea435b35bb331f4253e7800df
-
SHA512
d6edc093cfc8a914eb673ba32f8538179f5f34ad1f9fcf256b7b5b231493cf3fd31f7a523acedf24f284c01ab00edfcb0285e1bb89cecada4df9fc42824a3848
-
SSDEEP
1536:+N4JQjitMJrzQFNMe5LRz/apl7H6WSWuX/MMOCs2qg6U4:m4JQjitMJrzQFNMedUpl/SWs/dOC3qR9
Behavioral task
behavioral1
Sample
5ee781c11a0a34c5ef0fd481df91239f
Resource
ubuntu1804-amd64-20231215-en
Malware Config
Extracted
mirai
LZRD
Targets
-
-
Target
5ee781c11a0a34c5ef0fd481df91239f
-
Size
64KB
-
MD5
5ee781c11a0a34c5ef0fd481df91239f
-
SHA1
fa7b6d4ddc96b1209a7b2e7c77f12c16223257d9
-
SHA256
a9d1f056bea89bce9964d8c7788e727ca77888bea435b35bb331f4253e7800df
-
SHA512
d6edc093cfc8a914eb673ba32f8538179f5f34ad1f9fcf256b7b5b231493cf3fd31f7a523acedf24f284c01ab00edfcb0285e1bb89cecada4df9fc42824a3848
-
SSDEEP
1536:+N4JQjitMJrzQFNMe5LRz/apl7H6WSWuX/MMOCs2qg6U4:m4JQjitMJrzQFNMedUpl/SWs/dOC3qR9
Score9/10-
Contacts a large (20475) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Enumerates active TCP sockets
Gets active TCP sockets from /proc virtual filesystem.
-
Enumerates running processes
Discovers information about currently running processes on the system
-