General
-
Target
x86.elf
-
Size
26KB
-
Sample
240220-r75wwsae47
-
MD5
43d53cca019d0cff5b80c7b0d6860151
-
SHA1
a13746fef247693168c5eb85c5b8985096da5182
-
SHA256
14456d2015b422264b859d926cc335048cec988bc65715708189ca2950b59efc
-
SHA512
73f3f3fda018e8c1f209d01806eb1a08445aefd9a1fa825369d80885bc86555d7b8d3850625fa249b4b5584ec01f51f3c0f5d0ea7216993c35acbc8725abfbca
-
SSDEEP
384:M8v66YgiokzDM366q1tl8tN+7mOt7GvvfGjWNC+yfIzsYFqnD5vOXw6EM+v1Rn:J66Y4hy8S7GnAmufAYn5of+n
Malware Config
Extracted
mirai
BOTNET
securecameoutgay.ddns.net
Targets
-
-
Target
x86.elf
-
Size
26KB
-
MD5
43d53cca019d0cff5b80c7b0d6860151
-
SHA1
a13746fef247693168c5eb85c5b8985096da5182
-
SHA256
14456d2015b422264b859d926cc335048cec988bc65715708189ca2950b59efc
-
SHA512
73f3f3fda018e8c1f209d01806eb1a08445aefd9a1fa825369d80885bc86555d7b8d3850625fa249b4b5584ec01f51f3c0f5d0ea7216993c35acbc8725abfbca
-
SSDEEP
384:M8v66YgiokzDM366q1tl8tN+7mOt7GvvfGjWNC+yfIzsYFqnD5vOXw6EM+v1Rn:J66Y4hy8S7GnAmufAYn5of+n
-
Contacts a large (114621) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Changes its process name
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Enumerates running processes
Discovers information about currently running processes on the system
-