General
-
Target
cf38b0f630c1b9c217a4514fdf6b019f2a090a47091b6f3ad639e9dc8a8de50c.elf
-
Size
142KB
-
Sample
240708-bt2z3swbpq
-
MD5
d47422fe652ea0952b4b42cd69a5511e
-
SHA1
7785352a4e80cbcd589a68445282ffa99af460f6
-
SHA256
cf38b0f630c1b9c217a4514fdf6b019f2a090a47091b6f3ad639e9dc8a8de50c
-
SHA512
d6cf68dd04d2c375300fd936156d856b5f8a699de62e73537809bc588fddb83da8828787a71a0926b3f3e84d241813fa75761a7e05952339c042d3f6c66df66f
-
SSDEEP
3072:Mogb9pOAFCtAdnEhI+/Hz8i24V/LLqNOEGZLlQoYkozm:Mor2IHz124VzLqN/GxlQFk1
Behavioral task
behavioral1
Sample
cf38b0f630c1b9c217a4514fdf6b019f2a090a47091b6f3ad639e9dc8a8de50c.elf
Resource
debian9-armhf-20240418-en
Malware Config
Extracted
mirai
BOTNET
scan.yerco.xyz
Targets
-
-
Target
cf38b0f630c1b9c217a4514fdf6b019f2a090a47091b6f3ad639e9dc8a8de50c.elf
-
Size
142KB
-
MD5
d47422fe652ea0952b4b42cd69a5511e
-
SHA1
7785352a4e80cbcd589a68445282ffa99af460f6
-
SHA256
cf38b0f630c1b9c217a4514fdf6b019f2a090a47091b6f3ad639e9dc8a8de50c
-
SHA512
d6cf68dd04d2c375300fd936156d856b5f8a699de62e73537809bc588fddb83da8828787a71a0926b3f3e84d241813fa75761a7e05952339c042d3f6c66df66f
-
SSDEEP
3072:Mogb9pOAFCtAdnEhI+/Hz8i24V/LLqNOEGZLlQoYkozm:Mor2IHz124VzLqN/GxlQFk1
Score9/10-
Contacts a large (299333) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Writes file to system bin folder
-