General
-
Target
eb0bdd8f665b5afbb57e1f0f488371e7
-
Size
36KB
-
Sample
231220-t6v2eageg2
-
MD5
eb0bdd8f665b5afbb57e1f0f488371e7
-
SHA1
05a0c2b1d2b612d600d2bc74b7c200695c5c8238
-
SHA256
b6ec950df2458685ffe89387e1b49896308db621471e2930591fc0f9f94121f1
-
SHA512
988f8c58935d2e63c573f43b6c54296d21f551f89fb7a1046b18aa437c126efabd6b8c2b374ac077d0c1a8528f5c48ae0d812fa6a94676d31e6bb76b68bf4714
-
SSDEEP
768:W5le10ACFdg2FNbivFgFNcDkkZkOA7Us8k7+ZSV:W5le10ACF+0IvuDNUnk7QSV
Behavioral task
behavioral1
Sample
eb0bdd8f665b5afbb57e1f0f488371e7
Resource
ubuntu1804-amd64-20231215-en
Malware Config
Extracted
mirai
BOT
Targets
-
-
Target
eb0bdd8f665b5afbb57e1f0f488371e7
-
Size
36KB
-
MD5
eb0bdd8f665b5afbb57e1f0f488371e7
-
SHA1
05a0c2b1d2b612d600d2bc74b7c200695c5c8238
-
SHA256
b6ec950df2458685ffe89387e1b49896308db621471e2930591fc0f9f94121f1
-
SHA512
988f8c58935d2e63c573f43b6c54296d21f551f89fb7a1046b18aa437c126efabd6b8c2b374ac077d0c1a8528f5c48ae0d812fa6a94676d31e6bb76b68bf4714
-
SSDEEP
768:W5le10ACFdg2FNbivFgFNcDkkZkOA7Us8k7+ZSV:W5le10ACF+0IvuDNUnk7QSV
Score9/10-
Contacts a large (53979) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Changes its process name
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Enumerates active TCP sockets
Gets active TCP sockets from /proc virtual filesystem.
-
Enumerates running processes
Discovers information about currently running processes on the system
-
Writes file to system bin folder
-