General
-
Target
6ecb71f04b99db3cb031f8db704a90ab2d1f0b8ec7e8097cfa1237098de92a4f.elf
-
Size
45KB
-
Sample
240412-bn479aba36
-
MD5
56a79906178be5282722ad3cffde9223
-
SHA1
ab97a292bf7cc9df2988ccb8db0342192db14845
-
SHA256
6ecb71f04b99db3cb031f8db704a90ab2d1f0b8ec7e8097cfa1237098de92a4f
-
SHA512
a806f760bb243cfc4602116357e42a3cbe26358787a96a6f06667d73db2e69d7ad9874c6917504cc39d906b3f8c8f22560e2adc1bb14de005d68ca9bc27df56d
-
SSDEEP
768:yG/g8BmXjsBzaI6UxXDNF5CJrXRSEDzOO/ARApD/D/P+gWaplha5T:v/g2mzdI6UxTz5cgEfr/AapD7/PV/sV
Malware Config
Extracted
mirai
LZRD
Targets
-
-
Target
6ecb71f04b99db3cb031f8db704a90ab2d1f0b8ec7e8097cfa1237098de92a4f.elf
-
Size
45KB
-
MD5
56a79906178be5282722ad3cffde9223
-
SHA1
ab97a292bf7cc9df2988ccb8db0342192db14845
-
SHA256
6ecb71f04b99db3cb031f8db704a90ab2d1f0b8ec7e8097cfa1237098de92a4f
-
SHA512
a806f760bb243cfc4602116357e42a3cbe26358787a96a6f06667d73db2e69d7ad9874c6917504cc39d906b3f8c8f22560e2adc1bb14de005d68ca9bc27df56d
-
SSDEEP
768:yG/g8BmXjsBzaI6UxXDNF5CJrXRSEDzOO/ARApD/D/P+gWaplha5T:v/g2mzdI6UxTz5cgEfr/AapD7/PV/sV
-
Contacts a large (20582) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Enumerates active TCP sockets
Gets active TCP sockets from /proc virtual filesystem.
-
Enumerates running processes
Discovers information about currently running processes on the system
-