General
-
Target
x86.elf
-
Size
26KB
-
Sample
231224-lvhmyaeab9
-
MD5
041e81b723faec67c7da9592f866f3d9
-
SHA1
afab81ef5a1500cb06d86cbbb3ca55cb27b43128
-
SHA256
8e88d3bb25d54d12b2bf35dfa8c91daf4fc62df60ca6b6ebc7caa818231ed71b
-
SHA512
f45b91874c88a4436b8830dab1273e1cd36114295f5212f944c3b827d05b4dafbf5903d5d07e17e4106b2c4f75e91812d7615188f38ac7911783230ca3ae3a6e
-
SSDEEP
768:aeSaFyQtu3ggvBiPEKz5+s9OOfO4i6/F0KPJh2T1WxC2n:8a/ZgvcMu9OO3/PRC6
Malware Config
Extracted
mirai
BOTNET
homekoro.hopto.org
Targets
-
-
Target
x86.elf
-
Size
26KB
-
MD5
041e81b723faec67c7da9592f866f3d9
-
SHA1
afab81ef5a1500cb06d86cbbb3ca55cb27b43128
-
SHA256
8e88d3bb25d54d12b2bf35dfa8c91daf4fc62df60ca6b6ebc7caa818231ed71b
-
SHA512
f45b91874c88a4436b8830dab1273e1cd36114295f5212f944c3b827d05b4dafbf5903d5d07e17e4106b2c4f75e91812d7615188f38ac7911783230ca3ae3a6e
-
SSDEEP
768:aeSaFyQtu3ggvBiPEKz5+s9OOfO4i6/F0KPJh2T1WxC2n:8a/ZgvcMu9OO3/PRC6
-
Contacts a large (113593) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Changes its process name
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Enumerates running processes
Discovers information about currently running processes on the system
-