General
-
Target
c56a1003db8f5beb3c582f366909afcf
-
Size
87KB
-
Sample
240313-j9hkdaae38
-
MD5
c56a1003db8f5beb3c582f366909afcf
-
SHA1
bb3d50c294627cf84c9571706e173df3f4ae3efc
-
SHA256
6e50f63e75dfdf0b0eab0fedd7481165d4606c7e42e7055ec999df78ac2bd95a
-
SHA512
b6672b6e2639eac4405e03787c7952f10bc9170cbc38344306cd8929edb3eda48a1d2dbf521e453290b8e3974b9064f3f26c24286e226289abc344fa316b9f86
-
SSDEEP
1536:1YRdsnDd6C6gb/ZVyDYjMbwqZ9f0vfwW9ufY1C+KBtyRirfXDOiO/3J:CHsnD8/gb/zyDv9f0HD9FC+KBtyR6/D4
Behavioral task
behavioral1
Sample
c56a1003db8f5beb3c582f366909afcf
Resource
debian9-mipsbe-20240226-en
Malware Config
Extracted
mirai
LZRD
Targets
-
-
Target
c56a1003db8f5beb3c582f366909afcf
-
Size
87KB
-
MD5
c56a1003db8f5beb3c582f366909afcf
-
SHA1
bb3d50c294627cf84c9571706e173df3f4ae3efc
-
SHA256
6e50f63e75dfdf0b0eab0fedd7481165d4606c7e42e7055ec999df78ac2bd95a
-
SHA512
b6672b6e2639eac4405e03787c7952f10bc9170cbc38344306cd8929edb3eda48a1d2dbf521e453290b8e3974b9064f3f26c24286e226289abc344fa316b9f86
-
SSDEEP
1536:1YRdsnDd6C6gb/ZVyDYjMbwqZ9f0vfwW9ufY1C+KBtyRirfXDOiO/3J:CHsnD8/gb/zyDv9f0HD9FC+KBtyR6/D4
Score9/10-
Contacts a large (20420) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Enumerates active TCP sockets
Gets active TCP sockets from /proc virtual filesystem.
-
Enumerates running processes
Discovers information about currently running processes on the system
-