General
-
Target
7dca39066597a4dc093b6d31a65ae4e3.elf
-
Size
45KB
-
Sample
240418-yx89wseh4x
-
MD5
7dca39066597a4dc093b6d31a65ae4e3
-
SHA1
50a2113d43f547708893487b29e3cc1eef568ab0
-
SHA256
7d34f68e05ff02c35610806b8138d2e2c3bd7a2168b2e9c4335af1c38a2ad6a4
-
SHA512
ffcc149af4d1a19a6ebd97c1d7ef38f8082075dc7e73a292ff8face85778f3aa6f007da9d5ae7677056d76b894bca93d3ead0ad8e8a152da115bcf7b2b227f78
-
SSDEEP
768:kFsCAjAHYeH0OVnC/I3JcXKcgVgQ9E27PVFrvFb+INmUaD4y8Bj/Ms3IU:kFsCAjAHFHNVnLZ+gV5W0D+INm9D4PLJ
Behavioral task
behavioral1
Sample
7dca39066597a4dc093b6d31a65ae4e3.elf
Resource
ubuntu2004-amd64-20240221-en
Malware Config
Extracted
mirai
MIRAI
client.orxy.space
Targets
-
-
Target
7dca39066597a4dc093b6d31a65ae4e3.elf
-
Size
45KB
-
MD5
7dca39066597a4dc093b6d31a65ae4e3
-
SHA1
50a2113d43f547708893487b29e3cc1eef568ab0
-
SHA256
7d34f68e05ff02c35610806b8138d2e2c3bd7a2168b2e9c4335af1c38a2ad6a4
-
SHA512
ffcc149af4d1a19a6ebd97c1d7ef38f8082075dc7e73a292ff8face85778f3aa6f007da9d5ae7677056d76b894bca93d3ead0ad8e8a152da115bcf7b2b227f78
-
SSDEEP
768:kFsCAjAHYeH0OVnC/I3JcXKcgVgQ9E27PVFrvFb+INmUaD4y8Bj/Ms3IU:kFsCAjAHFHNVnLZ+gV5W0D+INm9D4PLJ
Score9/10-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Changes its process name
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-