General
-
Target
6226f2e22d74ffada87d08eb8b8098bd
-
Size
109KB
-
Sample
231219-3d3efshfg3
-
MD5
6226f2e22d74ffada87d08eb8b8098bd
-
SHA1
4f8a600adb7ca1be53a3d992835e3e2f03612f21
-
SHA256
a60cd0b89a4d183682490e3bad70b1f1078662b2640785483a588a71563ef57a
-
SHA512
63fbacbbebca23c4ebbdcc145c7bb17dc8253aeb723c66c792a9d38fc72e24824dc03bf8f8db475d4fd022103f91ba9b48cd84457e4c03f23b574d3628891033
-
SSDEEP
3072:14+j6+wxxCOyNv+xpYNl2O6Piq6L6M/9fVlO7:14+jk7byNv+xp88ninWM/9fVlO7
Behavioral task
behavioral1
Sample
6226f2e22d74ffada87d08eb8b8098bd
Resource
debian9-armhf-20231215-en
Malware Config
Extracted
mirai
BOT
Targets
-
-
Target
6226f2e22d74ffada87d08eb8b8098bd
-
Size
109KB
-
MD5
6226f2e22d74ffada87d08eb8b8098bd
-
SHA1
4f8a600adb7ca1be53a3d992835e3e2f03612f21
-
SHA256
a60cd0b89a4d183682490e3bad70b1f1078662b2640785483a588a71563ef57a
-
SHA512
63fbacbbebca23c4ebbdcc145c7bb17dc8253aeb723c66c792a9d38fc72e24824dc03bf8f8db475d4fd022103f91ba9b48cd84457e4c03f23b574d3628891033
-
SSDEEP
3072:14+j6+wxxCOyNv+xpYNl2O6Piq6L6M/9fVlO7:14+jk7byNv+xp88ninWM/9fVlO7
Score9/10-
Contacts a large (53981) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Changes its process name
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Enumerates active TCP sockets
Gets active TCP sockets from /proc virtual filesystem.
-
Writes file to system bin folder
-