General
-
Target
33a8f48fbd45a071419a7213affd014d.bin
-
Size
34KB
-
Sample
240630-b1q66a1hnh
-
MD5
100859f9bef5d1a0aa73d9928b9a5bea
-
SHA1
2e21ee4b8e4843d9d5618add10c24f5f2335b0e5
-
SHA256
a75b2303bb5cc48dc9e2f4fda497f97af3f187fcc788bbcf797af07d8d71375f
-
SHA512
6999fd0dd0ac78ea2e8a722d6d0fe5a00fcd68a7c456dfe5a316ee97963853ca00376d8eb06fcbd58a3d7d896a5fdbbfab9bea9a0871879ad32c91e91c7e4077
-
SSDEEP
768:Er6qjRLmL3/+IcU5f1jHe8Hu9CoPvPrpstKskjclHk+ujl:EbJO2bU5ZHO9CWXFsSYlHkbl
Behavioral task
behavioral1
Sample
ea22a852eaf0b7dd3e7b0a1c7d7fcff4fe66bb6875f611aefee2a5f0b45a273d.elf
Resource
debian9-mipsel-20240611-en
Malware Config
Extracted
mirai
MIRAI
Targets
-
-
Target
ea22a852eaf0b7dd3e7b0a1c7d7fcff4fe66bb6875f611aefee2a5f0b45a273d.elf
-
Size
106KB
-
MD5
33a8f48fbd45a071419a7213affd014d
-
SHA1
ab024426e73c70f8e5eb0903080e81444bcef54b
-
SHA256
ea22a852eaf0b7dd3e7b0a1c7d7fcff4fe66bb6875f611aefee2a5f0b45a273d
-
SHA512
75bd9de735baa8daa0e0ff3cc4ab942134bd3948097e8385bf410ad345643b370f02ef3e8ddf6002745e64524cbbcccd170a4fdf10036ee253e962fd6ef571dc
-
SSDEEP
3072:2bB8eJ2RC0w4NQJYrFzguMAt8nrMjrkvB9wrVMtvAT00LKrcTw0nINLzsrI5:2bB8w2fNW9cTw0nINLzsr
Score7/10-
Deletes itself
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Enumerates active TCP sockets
Gets active TCP sockets from /proc virtual filesystem.
-