General
-
Target
f1cd75bfb287dc4e84637509afd817de2a89e8b25a217d9c265277ae1948c70e.elf
-
Size
67KB
-
Sample
240319-djvt5agf5v
-
MD5
c2aec2e79b3e1dd79e1e77308d4b80cb
-
SHA1
2da5d4b9ffd7c147cc18e2169c3249132e1ad98f
-
SHA256
f1cd75bfb287dc4e84637509afd817de2a89e8b25a217d9c265277ae1948c70e
-
SHA512
017c84f6d1f38fd4f210ac11088f812a94d2c6213570dad19561a2c1c7b72cd9dfd6e10656b97e26a11a1e5bbb7f5eadbcd54fc71507468d91b3e91fb6aa7cbd
-
SSDEEP
1536:XN1FyOKY49VIg4dJ6no3ILvTc9+B6Zwnz4ag:X/FyOKY49VX4j6o+Eq
Behavioral task
behavioral1
Sample
f1cd75bfb287dc4e84637509afd817de2a89e8b25a217d9c265277ae1948c70e.elf
Resource
debian12-mipsel-20240221-en
Malware Config
Extracted
mirai
BOTNET
Targets
-
-
Target
f1cd75bfb287dc4e84637509afd817de2a89e8b25a217d9c265277ae1948c70e.elf
-
Size
67KB
-
MD5
c2aec2e79b3e1dd79e1e77308d4b80cb
-
SHA1
2da5d4b9ffd7c147cc18e2169c3249132e1ad98f
-
SHA256
f1cd75bfb287dc4e84637509afd817de2a89e8b25a217d9c265277ae1948c70e
-
SHA512
017c84f6d1f38fd4f210ac11088f812a94d2c6213570dad19561a2c1c7b72cd9dfd6e10656b97e26a11a1e5bbb7f5eadbcd54fc71507468d91b3e91fb6aa7cbd
-
SSDEEP
1536:XN1FyOKY49VIg4dJ6no3ILvTc9+B6Zwnz4ag:X/FyOKY49VX4j6o+Eq
Score9/10-
Contacts a large (108987) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Changes its process name
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Enumerates running processes
Discovers information about currently running processes on the system
-