General
-
Target
8b2d556ada616f3bf3be3bcce2278c34
-
Size
89KB
-
Sample
231220-g46znsfdfn
-
MD5
8b2d556ada616f3bf3be3bcce2278c34
-
SHA1
e60f132c067c2a7f63c8d8e7a50f9c85aed42022
-
SHA256
16a56f79611f725936ed9d791336228b8ce6f1acf3451fa87e71615257e70bd0
-
SHA512
00c96496df219a68a87ece693b8ed6e5bde4a5cabe0a4b3ba7a4747f1a3880c0c4ff4e92c48140ba457326fae064f6a751ef2d54f3502bc7c3f246b917d0bcae
-
SSDEEP
1536:NYCYxrXP40ODyPwHRQ9PlzTRfyToNoZqWi:qCYxrKDy46NX
Behavioral task
behavioral1
Sample
8b2d556ada616f3bf3be3bcce2278c34
Resource
debian9-mipsel-20231215-en
Malware Config
Extracted
mirai
LZRD
Targets
-
-
Target
8b2d556ada616f3bf3be3bcce2278c34
-
Size
89KB
-
MD5
8b2d556ada616f3bf3be3bcce2278c34
-
SHA1
e60f132c067c2a7f63c8d8e7a50f9c85aed42022
-
SHA256
16a56f79611f725936ed9d791336228b8ce6f1acf3451fa87e71615257e70bd0
-
SHA512
00c96496df219a68a87ece693b8ed6e5bde4a5cabe0a4b3ba7a4747f1a3880c0c4ff4e92c48140ba457326fae064f6a751ef2d54f3502bc7c3f246b917d0bcae
-
SSDEEP
1536:NYCYxrXP40ODyPwHRQ9PlzTRfyToNoZqWi:qCYxrKDy46NX
Score9/10-
Contacts a large (18898) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Enumerates active TCP sockets
Gets active TCP sockets from /proc virtual filesystem.
-
Enumerates running processes
Discovers information about currently running processes on the system
-