General
-
Target
botx.arm.elf
-
Size
66KB
-
Sample
240717-nxvrdsygpr
-
MD5
5d5526121b2523e0529dfae885bbd0e6
-
SHA1
530a0fe8e41110f48ca38a7245aa9a1d4be4e297
-
SHA256
36112baf999e30b224975360b50eff88b92a0231e432e012a8d346b66470b3af
-
SHA512
6f2499e8ee44619d26797ca9efa2535dd4c795ffcfa1a90935c25352a8ad4958a131b1b81ac29ae286c69beefc1a93819952daa3d169370a10ffb1faa51eb8c5
-
SSDEEP
1536:JHQr+CVG1Jb4k8ixG3tcs5QFC2Zw+fXFSewOYlTb+10mPvR:mr+71Z4JixGKs5Qc4pvFSewOKTe/
Behavioral task
behavioral1
Sample
botx.arm.elf
Resource
debian9-armhf-20240611-en
Malware Config
Extracted
mirai
CONDI
report.condinet.cf
Targets
-
-
Target
botx.arm.elf
-
Size
66KB
-
MD5
5d5526121b2523e0529dfae885bbd0e6
-
SHA1
530a0fe8e41110f48ca38a7245aa9a1d4be4e297
-
SHA256
36112baf999e30b224975360b50eff88b92a0231e432e012a8d346b66470b3af
-
SHA512
6f2499e8ee44619d26797ca9efa2535dd4c795ffcfa1a90935c25352a8ad4958a131b1b81ac29ae286c69beefc1a93819952daa3d169370a10ffb1faa51eb8c5
-
SSDEEP
1536:JHQr+CVG1Jb4k8ixG3tcs5QFC2Zw+fXFSewOYlTb+10mPvR:mr+71Z4JixGKs5Qc4pvFSewOKTe/
Score9/10-
Contacts a large (53734) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Writes file to system bin folder
-