General
-
Target
aa68bcd07480385acca1c2789c22a28f5606719e0987ca8e95da25f2d5569278.elf
-
Size
36KB
-
Sample
240414-b1llnsch28
-
MD5
4abd1291946a20a608bce573851e2d4f
-
SHA1
4d8ae71f607db06581c96a003cdb79f41e47de52
-
SHA256
aa68bcd07480385acca1c2789c22a28f5606719e0987ca8e95da25f2d5569278
-
SHA512
dc8c54cc7bd753ccd647645f4fe28c23ed6287708b233f9c057a70beecf079374acce5908434473acb0ce5bac4d7e9cf0531347e826a8134e9cb0dfb0d20bd6a
-
SSDEEP
768:VWKJNd+lsAnOx8uQMMaQ9tIUnsriuAve3bQTjNVC2qaWt:VWKh2IpBMU+KiuTsTjNVCV
Malware Config
Extracted
mirai
LZRD
Targets
-
-
Target
aa68bcd07480385acca1c2789c22a28f5606719e0987ca8e95da25f2d5569278.elf
-
Size
36KB
-
MD5
4abd1291946a20a608bce573851e2d4f
-
SHA1
4d8ae71f607db06581c96a003cdb79f41e47de52
-
SHA256
aa68bcd07480385acca1c2789c22a28f5606719e0987ca8e95da25f2d5569278
-
SHA512
dc8c54cc7bd753ccd647645f4fe28c23ed6287708b233f9c057a70beecf079374acce5908434473acb0ce5bac4d7e9cf0531347e826a8134e9cb0dfb0d20bd6a
-
SSDEEP
768:VWKJNd+lsAnOx8uQMMaQ9tIUnsriuAve3bQTjNVC2qaWt:VWKh2IpBMU+KiuTsTjNVCV
-
Contacts a large (20425) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Enumerates active TCP sockets
Gets active TCP sockets from /proc virtual filesystem.
-
Enumerates running processes
Discovers information about currently running processes on the system
-