General
-
Target
aed0bf84c27ecc25d01925110c66283e
-
Size
50KB
-
Sample
231220-n3jlbaafe6
-
MD5
aed0bf84c27ecc25d01925110c66283e
-
SHA1
c4ba75ffef3a09a9fa7d952813a7186650c83725
-
SHA256
3724d0b6a26f03f37a05545e05df437e34aae7984e439cde0bc70b54b4cb6898
-
SHA512
4c7035bfb79480c4d136f84d23f57d59a1be6ebcfff36225b4285e431b2a707b2ac5187b9c5c56d6775437c29941f396e80ce584fab79694d7616034a0783088
-
SSDEEP
768:ZQHXml16Wjl1DC059OOZ6/7wBJ4Yp2BWKk51WdrPBONsjyKo4kNLkGeQTcEKTcMx:bfMBWBWdrBvIeDJTEDGhtrHvux4nA
Behavioral task
behavioral1
Sample
aed0bf84c27ecc25d01925110c66283e
Resource
debian9-armhf-20231215-en
Malware Config
Extracted
mirai
BOT
Targets
-
-
Target
aed0bf84c27ecc25d01925110c66283e
-
Size
50KB
-
MD5
aed0bf84c27ecc25d01925110c66283e
-
SHA1
c4ba75ffef3a09a9fa7d952813a7186650c83725
-
SHA256
3724d0b6a26f03f37a05545e05df437e34aae7984e439cde0bc70b54b4cb6898
-
SHA512
4c7035bfb79480c4d136f84d23f57d59a1be6ebcfff36225b4285e431b2a707b2ac5187b9c5c56d6775437c29941f396e80ce584fab79694d7616034a0783088
-
SSDEEP
768:ZQHXml16Wjl1DC059OOZ6/7wBJ4Yp2BWKk51WdrPBONsjyKo4kNLkGeQTcEKTcMx:bfMBWBWdrBvIeDJTEDGhtrHvux4nA
Score9/10-
Contacts a large (10077) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Changes its process name
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Enumerates active TCP sockets
Gets active TCP sockets from /proc virtual filesystem.
-
Enumerates running processes
Discovers information about currently running processes on the system
-
Writes file to system bin folder
-