General
-
Target
cb5e35f6678d211d62082abbdf8ed043
-
Size
30KB
-
Sample
240315-pab67saa32
-
MD5
cb5e35f6678d211d62082abbdf8ed043
-
SHA1
3a8e1ceced8c898f57012c7e582665fbdd285f82
-
SHA256
7cf536056bde571ca40918a538ef1baf4d7f79614f4c935fae93f2ffa855c3cc
-
SHA512
baffb0977201d19d162270ad5f8c8a690dd4b7324f807b91aed51fd73d9991477a932fed4a61aa342a7ef020e8042a0450d66e917738efa20361be4ea1d4ed91
-
SSDEEP
768:zJmyA9KgTfv3k+3fl9BP4dKpHkeHR6AqBYVxJgGlzDpbuR1JI:hMvjv0ofl9FpHmAqBgVJuG
Malware Config
Extracted
mirai
LZRD
Targets
-
-
Target
cb5e35f6678d211d62082abbdf8ed043
-
Size
30KB
-
MD5
cb5e35f6678d211d62082abbdf8ed043
-
SHA1
3a8e1ceced8c898f57012c7e582665fbdd285f82
-
SHA256
7cf536056bde571ca40918a538ef1baf4d7f79614f4c935fae93f2ffa855c3cc
-
SHA512
baffb0977201d19d162270ad5f8c8a690dd4b7324f807b91aed51fd73d9991477a932fed4a61aa342a7ef020e8042a0450d66e917738efa20361be4ea1d4ed91
-
SSDEEP
768:zJmyA9KgTfv3k+3fl9BP4dKpHkeHR6AqBYVxJgGlzDpbuR1JI:hMvjv0ofl9FpHmAqBgVJuG
-
Contacts a large (19992) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Enumerates active TCP sockets
Gets active TCP sockets from /proc virtual filesystem.
-
Enumerates running processes
Discovers information about currently running processes on the system
-