General
-
Target
9dff7d489e0eba04c2ee896a2d11c1f1
-
Size
29KB
-
Sample
231220-lmyzysbca9
-
MD5
9dff7d489e0eba04c2ee896a2d11c1f1
-
SHA1
05d90cc54387ae144645dd7a660eb3f2a910e9dd
-
SHA256
3f494e3cc6942dca3c2ff251d65d7c108839797dd40e817edbdcd2fee1dbe634
-
SHA512
d23e29a765401f54bfed07748c4463b8182dc09dc138395eef3e91394174227124c5c4a4149130dfad37d09bbf4a854d6562fdb94e8590cd9be0d48bd1177a6f
-
SSDEEP
768:oFoxdX+IoMKVUfzaP1urxIGyYUzpzAhDxZ9rx1s3Uozy:oF2+IoXVeNIlzpzAPrx4zy
Malware Config
Extracted
mirai
UNST
Targets
-
-
Target
9dff7d489e0eba04c2ee896a2d11c1f1
-
Size
29KB
-
MD5
9dff7d489e0eba04c2ee896a2d11c1f1
-
SHA1
05d90cc54387ae144645dd7a660eb3f2a910e9dd
-
SHA256
3f494e3cc6942dca3c2ff251d65d7c108839797dd40e817edbdcd2fee1dbe634
-
SHA512
d23e29a765401f54bfed07748c4463b8182dc09dc138395eef3e91394174227124c5c4a4149130dfad37d09bbf4a854d6562fdb94e8590cd9be0d48bd1177a6f
-
SSDEEP
768:oFoxdX+IoMKVUfzaP1urxIGyYUzpzAhDxZ9rx1s3Uozy:oF2+IoXVeNIlzpzAPrx4zy
-
Contacts a large (20325) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Enumerates active TCP sockets
Gets active TCP sockets from /proc virtual filesystem.
-
Enumerates running processes
Discovers information about currently running processes on the system
-