General
-
Target
eb9731dbd90a56af5a7f75188d1cc6c3463091770dcd4a5581136fcbe458043d.elf
-
Size
29KB
-
Sample
240419-cjw7hsdg44
-
MD5
7c2da8202951debe176fc47541ae754c
-
SHA1
ed011df676af41489ef38213af10b5c70831ec0d
-
SHA256
eb9731dbd90a56af5a7f75188d1cc6c3463091770dcd4a5581136fcbe458043d
-
SHA512
d489bb706464baf4e6431077feb9ac5f85b6898e3faeffe06d3f093dbe59b80e7de5285743b0443ff1c512cfeefc223879d5adb2f0a321c5411aaf707bb4f4af
-
SSDEEP
768:ELZW56tNDAFiY4FGG1Nn8MPDEzg6cHoC5Is7nbcuyD7U0/2j:FMtmij8wyVcj5dnouy8jj
Malware Config
Extracted
mirai
KYTON
Targets
-
-
Target
eb9731dbd90a56af5a7f75188d1cc6c3463091770dcd4a5581136fcbe458043d.elf
-
Size
29KB
-
MD5
7c2da8202951debe176fc47541ae754c
-
SHA1
ed011df676af41489ef38213af10b5c70831ec0d
-
SHA256
eb9731dbd90a56af5a7f75188d1cc6c3463091770dcd4a5581136fcbe458043d
-
SHA512
d489bb706464baf4e6431077feb9ac5f85b6898e3faeffe06d3f093dbe59b80e7de5285743b0443ff1c512cfeefc223879d5adb2f0a321c5411aaf707bb4f4af
-
SSDEEP
768:ELZW56tNDAFiY4FGG1Nn8MPDEzg6cHoC5Is7nbcuyD7U0/2j:FMtmij8wyVcj5dnouy8jj
-
Contacts a large (111541) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Changes its process name
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Enumerates active TCP sockets
Gets active TCP sockets from /proc virtual filesystem.
-
Writes file to system bin folder
-