General
-
Target
6cef4e41b58be6fb4e2dd50c783c0c87.bin
-
Size
272KB
-
Sample
240426-bqnchsgh66
-
MD5
ba16485b8a2e921c3a573fbb1bebaa90
-
SHA1
3d2bf14790b45b21256b3f6d73daa4ff958e09ee
-
SHA256
94f559b08a30ec35a058b6c39eb667e7df454a5a874c37ae13c43f454211e5df
-
SHA512
d8710f728637a6afcd79cda403ea20b15074eaba5b67f170afbec9de37b726d31de1b891857bbaf8fa1088c944e0c76173464f979c7a74a56a5affac451cc22c
-
SSDEEP
6144:hixyWp8N4k2OroOBewT1/CnbpbvAhodnxLQNQ75ri4nx:hisV4I2nxvtvQNQFiSx
Static task
static1
Behavioral task
behavioral1
Sample
4730105d00af6296688da0b51f3b9be8ea81a4844a3a1d9996256fc218920f28.elf
Resource
ubuntu2004-amd64-20240221-en
Malware Config
Extracted
mirai
LZRD
Targets
-
-
Target
4730105d00af6296688da0b51f3b9be8ea81a4844a3a1d9996256fc218920f28.elf
-
Size
274KB
-
MD5
6cef4e41b58be6fb4e2dd50c783c0c87
-
SHA1
fd5ded3422f64c3930e6541bd54dfb1083916f66
-
SHA256
4730105d00af6296688da0b51f3b9be8ea81a4844a3a1d9996256fc218920f28
-
SHA512
fbdd467bbf0a3b3cec9564075bfd5d977900acb502d1c15bfb9ba6920bea3cda92c62f15cf50c7335ffb43d6046581c0020a90cec3b6227b61a6b93135e5fe42
-
SSDEEP
6144:Uxc6tV4HX2TmFGR+WgB+Pjq32p5PPyMwsUpE9BNKaOA5IsY/Vi5iaL:KUtm+5QPjq3SIpLaOAGNK
Score10/10-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Reads EFI boot settings
Reads EFI boot settings from the efivars filesystem, may contain security secrets or sensitive data.
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Creates/modifies Cron job
Cron allows running tasks on a schedule, and is commonly used for malware persistence.
-
Writes file to system bin folder
-