General
-
Target
76fce295c4d9b3bd684de4610731273f.bin
-
Size
32KB
-
Sample
240221-dnezgaac8z
-
MD5
39082cb9c1ab0dd56c031406cbe37b46
-
SHA1
40ff427e615199625c1cb759aa5d594c1a626672
-
SHA256
ec1ad44b296a45e5ab56a9a8f6faa2f35f23dbff02661331a9052d61e03d7992
-
SHA512
7cf01b71bb7f93b81579a480a2989b69c37cdd3fc0ea85baeda145dcbef07e260a7c89ed32d275a27e4790e8b386818447fd08ea7fc43484163be1f18f872fbc
-
SSDEEP
768:/MD4FI5lFAE8eaLTnV8OwgLVg/O0F/bzMG0aZNnVH9+89:/7s0LbPTgWa/bznVHT9
Behavioral task
behavioral1
Sample
9d0f87de4c4cda03364ea184070a9ec0ca994f48b460f1088b6aadbb32cc790d.elf
Resource
ubuntu1804-amd64-20231215-en
Malware Config
Extracted
mirai
bonet.networkbn.com
Targets
-
-
Target
9d0f87de4c4cda03364ea184070a9ec0ca994f48b460f1088b6aadbb32cc790d.elf
-
Size
61KB
-
MD5
76fce295c4d9b3bd684de4610731273f
-
SHA1
46ad640e60b604dc4f513c6f0379a817d0cdea32
-
SHA256
9d0f87de4c4cda03364ea184070a9ec0ca994f48b460f1088b6aadbb32cc790d
-
SHA512
8040c9286739905fa407656d606cb53813d905288ad7e7a65aa8ecb5634dfaa320a70e41432d332d42f4422dfa6d7e736b3f87c7bd56da81e44b0f5611364e24
-
SSDEEP
1536:dpmbSQ6U3q7cCBT/lZsK/XYDiwE2NsimfFoktCe3fcxQj:WShU3q7cEDlCK/XYDsHi8Fok06fcxM
Score9/10-
Contacts a large (37877) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Changes its process name
-
Enumerates running processes
Discovers information about currently running processes on the system
-