General
-
Target
0050c722e4d0fab41a619b6f820dab9c.elf
-
Size
53KB
-
Sample
240110-3cjkysabdk
-
MD5
0050c722e4d0fab41a619b6f820dab9c
-
SHA1
45fad51a49d25a309e5d70e6b9c6548ee8c4b3a0
-
SHA256
663612d085e1720a68b9859324d90c179087b282d52bc6011c2c0556a03ea817
-
SHA512
d6bd8b29bc6b4570b7240bc6e221adb6465cd2d1e0b0a312547dbbb0e6c36587c173a6cc3e1ce1a9f988008cea954de21c4c0f5bba43685a1c7234572bdf5e86
-
SSDEEP
1536:VJCqjbwNRaPq5FllaxwOzvT+Toao9Mkv:FjEraP4llaxwIT+T3mMk
Behavioral task
behavioral1
Sample
0050c722e4d0fab41a619b6f820dab9c.elf
Resource
ubuntu1804-amd64-20231215-en
Malware Config
Extracted
mirai
BOTNET
cnc7.cremeonu.online
Targets
-
-
Target
0050c722e4d0fab41a619b6f820dab9c.elf
-
Size
53KB
-
MD5
0050c722e4d0fab41a619b6f820dab9c
-
SHA1
45fad51a49d25a309e5d70e6b9c6548ee8c4b3a0
-
SHA256
663612d085e1720a68b9859324d90c179087b282d52bc6011c2c0556a03ea817
-
SHA512
d6bd8b29bc6b4570b7240bc6e221adb6465cd2d1e0b0a312547dbbb0e6c36587c173a6cc3e1ce1a9f988008cea954de21c4c0f5bba43685a1c7234572bdf5e86
-
SSDEEP
1536:VJCqjbwNRaPq5FllaxwOzvT+Toao9Mkv:FjEraP4llaxwIT+T3mMk
Score9/10-
Contacts a large (114878) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Changes its process name
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Enumerates running processes
Discovers information about currently running processes on the system
-