General
-
Target
9432fbfaaa453643e544dc58866082b5
-
Size
31KB
-
Sample
231220-j7qszabeel
-
MD5
9432fbfaaa453643e544dc58866082b5
-
SHA1
7117623054866ca5fdcb38d23cd2558f53abe14f
-
SHA256
c942b74604f17b99a77a5492cf071204259b5d2173bbc4eba6ed7c571b5e6fbf
-
SHA512
c301b2ab5e68d06b865eb6ce2fe9b103afc850c8d72b750d1239034c55e6918b0474b90978d813d5f116487110100fb55ee922f68a1d52de5f33ef68ba2652a6
-
SSDEEP
768:M4JlYBuDo6erp03CeIpL52GAm1CRT3PlCUSNq2lLvXdlaj+WJ:M0KBuGrp4CcmYRT/lCbblDXdAjV
Malware Config
Extracted
mirai
UNST
Targets
-
-
Target
9432fbfaaa453643e544dc58866082b5
-
Size
31KB
-
MD5
9432fbfaaa453643e544dc58866082b5
-
SHA1
7117623054866ca5fdcb38d23cd2558f53abe14f
-
SHA256
c942b74604f17b99a77a5492cf071204259b5d2173bbc4eba6ed7c571b5e6fbf
-
SHA512
c301b2ab5e68d06b865eb6ce2fe9b103afc850c8d72b750d1239034c55e6918b0474b90978d813d5f116487110100fb55ee922f68a1d52de5f33ef68ba2652a6
-
SSDEEP
768:M4JlYBuDo6erp03CeIpL52GAm1CRT3PlCUSNq2lLvXdlaj+WJ:M0KBuGrp4CcmYRT/lCbblDXdAjV
-
Contacts a large (20146) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Enumerates active TCP sockets
Gets active TCP sockets from /proc virtual filesystem.
-
Enumerates running processes
Discovers information about currently running processes on the system
-