General
-
Target
74409c5d5ca9b002c1a629596185b621.elf
-
Size
54KB
-
Sample
240219-hysersba97
-
MD5
74409c5d5ca9b002c1a629596185b621
-
SHA1
9cfac78d9e184e5bf1b8f401a8e4939d518ec754
-
SHA256
0922fc68fb3d1cc0a39634a7c1670eaab1ba267bf71278758189c4c6a266b951
-
SHA512
f0b3557b4c1ccad72ac88b1b9ef7f914b9132371ae6664a09dfac907bcb1b6c68edefd8e9a230c818bd10d54e7933513e649b3ea9f5ecc190c73f000a74d6e59
-
SSDEEP
1536:JeESt/basV2rcZhG6ayN7PYHE9qpFzWOIaEjrqM2s:JeESt/basVTga7PYHEwp9tXESR
Behavioral task
behavioral1
Sample
74409c5d5ca9b002c1a629596185b621.elf
Resource
ubuntu1804-amd64-20231221-en
Malware Config
Extracted
mirai
botnet.layer4.bf
Targets
-
-
Target
74409c5d5ca9b002c1a629596185b621.elf
-
Size
54KB
-
MD5
74409c5d5ca9b002c1a629596185b621
-
SHA1
9cfac78d9e184e5bf1b8f401a8e4939d518ec754
-
SHA256
0922fc68fb3d1cc0a39634a7c1670eaab1ba267bf71278758189c4c6a266b951
-
SHA512
f0b3557b4c1ccad72ac88b1b9ef7f914b9132371ae6664a09dfac907bcb1b6c68edefd8e9a230c818bd10d54e7933513e649b3ea9f5ecc190c73f000a74d6e59
-
SSDEEP
1536:JeESt/basV2rcZhG6ayN7PYHE9qpFzWOIaEjrqM2s:JeESt/basVTga7PYHEwp9tXESR
Score9/10-
Contacts a large (37881) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Changes its process name
-
Enumerates running processes
Discovers information about currently running processes on the system
-