General
-
Target
ce76c251fc8c5bdf952155a00110999cad9293df3dfbd77f3052a776e38a88a2.elf
-
Size
21KB
-
Sample
240220-gqyfdada87
-
MD5
d90083dfd292ebd22c3f739fc6ed9a36
-
SHA1
1bea0efe7d6d3f0732fdf59c1f8a9fbf357e4694
-
SHA256
ce76c251fc8c5bdf952155a00110999cad9293df3dfbd77f3052a776e38a88a2
-
SHA512
5861cefa1c150aab6aaf127665dc5f0145e6f111e28fffe4d7125c7cecdeced2e199345676b332525e229728ebd36ba465347260fb79b68a31967f5e505631c1
-
SSDEEP
384:d1MHEoLJKWu8Tbs5uKWxfV1G+WCT8Iso0huuKnh06GzhymdGUop5hv:d1MHEotKScuK+f4INTu8Gzs3UozB
Malware Config
Extracted
mirai
UNST
Targets
-
-
Target
ce76c251fc8c5bdf952155a00110999cad9293df3dfbd77f3052a776e38a88a2.elf
-
Size
21KB
-
MD5
d90083dfd292ebd22c3f739fc6ed9a36
-
SHA1
1bea0efe7d6d3f0732fdf59c1f8a9fbf357e4694
-
SHA256
ce76c251fc8c5bdf952155a00110999cad9293df3dfbd77f3052a776e38a88a2
-
SHA512
5861cefa1c150aab6aaf127665dc5f0145e6f111e28fffe4d7125c7cecdeced2e199345676b332525e229728ebd36ba465347260fb79b68a31967f5e505631c1
-
SSDEEP
384:d1MHEoLJKWu8Tbs5uKWxfV1G+WCT8Iso0huuKnh06GzhymdGUop5hv:d1MHEotKScuK+f4INTu8Gzs3UozB
-
Contacts a large (64620) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Enumerates active TCP sockets
Gets active TCP sockets from /proc virtual filesystem.
-
Enumerates running processes
Discovers information about currently running processes on the system
-