General
-
Target
807b92c4d123999523d73e31df6ede55281af79cf4d1ad4328acea6d07a239c1
-
Size
72KB
-
Sample
240829-dfqq1azhlc
-
MD5
931ed22fd9e450e2b90d71d4077efe53
-
SHA1
8e85acc1adbda6fc3ecd4a3a2a5d49503630e71c
-
SHA256
807b92c4d123999523d73e31df6ede55281af79cf4d1ad4328acea6d07a239c1
-
SHA512
03e79e6fcf17d946eab2f86262aedda8bb028b163ef8ccc2953f2cc65d502d2a7b796bff95975941c7449d670bb62467131c9cf222e8e113f6d2c73519cdb167
-
SSDEEP
1536:MM7BCBvPxtaSLfNf/eLa+iz90j/nz+7vAeSMYIyAmf8z3V0i4g4m7Y:MaCBPxta25emz2/z+b9Sr+m0LVog4mc
Behavioral task
behavioral1
Sample
8d067840ee0530be3bdbd994504d54cdef590146db9fe2e07901b72f0ae0b0f2.elf
Resource
debian9-armhf-20240611-en
Malware Config
Extracted
mirai
BOTNET
Targets
-
-
Target
8d067840ee0530be3bdbd994504d54cdef590146db9fe2e07901b72f0ae0b0f2.elf
-
Size
162KB
-
MD5
342a8451e599df45b1939b3037a3c419
-
SHA1
ee2ecba6f84bc51430ad37e494652280defd3867
-
SHA256
8d067840ee0530be3bdbd994504d54cdef590146db9fe2e07901b72f0ae0b0f2
-
SHA512
01affab648c42658840d370960033f1aabd554d801aeaedbb3fba51937691746da94a5e1e88b38b2752ce10a028a8605e56ac04c99304ff4618fba8bc3c763a3
-
SSDEEP
3072:Pfz/U2fX3b/CMEfJgAMGRQuJOjkErF3Di8VP:Xzc2KBgAMeQuJOw2F3Di+
Score9/10-
Contacts a large (307238) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Enumerates running processes
Discovers information about currently running processes on the system
-
Writes file to system bin folder
-