General
-
Target
baccfac095d7f93d6fb56f00e2542cf0bin.zip
-
Size
66KB
-
Sample
240106-lz3tnsebd6
-
MD5
f0a4853ec5ef0f5d7bdc1a04de8ce0df
-
SHA1
0f226bb03c8f372786e2260ae8ff0f6c9c287db6
-
SHA256
2a3f7e660a50353ab8dfd941a4c07030cde2be3d7b31f3d4abbe1718b6483944
-
SHA512
bcb1ad9733e6a422d6076bdf100b130f2c427fd5b0e6e1e33c5a9eb9322a480b46b4f13f6bbe4146897465be32ee3c0a227f684094ae35616611bb9fe6623010
-
SSDEEP
1536:M9njgrqa4xCtrmeR/vjiVE/VM0/0lHCppqlIGWXNBJe:SjXbUk4jsE/VM0/OHuuNsNBw
Behavioral task
behavioral1
Sample
f7907fd93577b22ba3be2f994e445c5eb196ebc474aa99e61d30a4a4c07dca16.elf
Resource
debian9-armhf-20231221-en
Malware Config
Extracted
mirai
MIRAI
cnc.catairlines.net
Targets
-
-
Target
f7907fd93577b22ba3be2f994e445c5eb196ebc474aa99e61d30a4a4c07dca16.elf
-
Size
152KB
-
MD5
baccfac095d7f93d6fb56f00e2542cf0
-
SHA1
375795450b95232a8fc8d318bac84cda24079624
-
SHA256
f7907fd93577b22ba3be2f994e445c5eb196ebc474aa99e61d30a4a4c07dca16
-
SHA512
0baf011f59e34511c36e587888d026d2088a19c432f327b7a2201a9ff5b7342d4e083c42cd17aaccad800c0a15180480cf18fe58be533d57d83499779af2cb5f
-
SSDEEP
3072:87J9bRaoVf6aWaKzNRDIRQHr7jr/ytxzM/9w44pN:87JzNl6aWaKzNRcRy3/ytZM/9y7
Score9/10-
Contacts a large (7683) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Changes its process name
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Writes file to system bin folder
-