General
-
Target
c78e7bd8b4d26a7e5b073bbd98cf2909
-
Size
30KB
-
Sample
240314-dxjn1sbf85
-
MD5
c78e7bd8b4d26a7e5b073bbd98cf2909
-
SHA1
f0c4195235a0774032bfcf944c2aae54180d52a7
-
SHA256
74e04c6de8b44d454bf5ffcaad4102e1c5fe6d37dc8dc87d975d0ee83aaca631
-
SHA512
17032bf31a646b709f0346824ec5d78c5721bdbc7163a1450f0bc508c2b9bd00a7409bcfa0ded34a3e531684a3e4a8325e31e85f3e4e8776d83ff87b0dd3cbb4
-
SSDEEP
768:6WVQ1DPy6IdNXiWoD5u2t6duxoqt3PDKmkuJgGlzDpbuR1J+3:6We1e6gXj40duxoqRfVJuq
Malware Config
Extracted
mirai
LZRD
Targets
-
-
Target
c78e7bd8b4d26a7e5b073bbd98cf2909
-
Size
30KB
-
MD5
c78e7bd8b4d26a7e5b073bbd98cf2909
-
SHA1
f0c4195235a0774032bfcf944c2aae54180d52a7
-
SHA256
74e04c6de8b44d454bf5ffcaad4102e1c5fe6d37dc8dc87d975d0ee83aaca631
-
SHA512
17032bf31a646b709f0346824ec5d78c5721bdbc7163a1450f0bc508c2b9bd00a7409bcfa0ded34a3e531684a3e4a8325e31e85f3e4e8776d83ff87b0dd3cbb4
-
SSDEEP
768:6WVQ1DPy6IdNXiWoD5u2t6duxoqt3PDKmkuJgGlzDpbuR1J+3:6We1e6gXj40duxoqRfVJuq
-
Contacts a large (20390) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Enumerates active TCP sockets
Gets active TCP sockets from /proc virtual filesystem.
-
Enumerates running processes
Discovers information about currently running processes on the system
-