General
-
Target
x8664
-
Size
148KB
-
Sample
240906-qp34xazald
-
MD5
2d2cb35160309ed2669863dc33faf4bb
-
SHA1
d41bf1ba8a23c7329bfdc2c70f2be70fb55229bd
-
SHA256
9903dce03d17cc671f9842b2bb533b8a3eca715e75c355dec91ea0ad7fa67c1c
-
SHA512
451087729a286693b4c7bf2d121858720126d11ff2752e287b4206601b3a4213d21ab59b225e0a7736fbfd83e1e6b45d62f22f896c28d03f8f4f74f29dd7c194
-
SSDEEP
3072:DpT1FUc3A3DR93HYVcn2ej37mDfWQlnCR3TAS0uJF:DpscyoDe8jlpqJF
Behavioral task
behavioral1
Sample
x8664
Resource
ubuntu1804-amd64-20240611-en
Malware Config
Extracted
mirai
BOTNET
Targets
-
-
Target
x8664
-
Size
148KB
-
MD5
2d2cb35160309ed2669863dc33faf4bb
-
SHA1
d41bf1ba8a23c7329bfdc2c70f2be70fb55229bd
-
SHA256
9903dce03d17cc671f9842b2bb533b8a3eca715e75c355dec91ea0ad7fa67c1c
-
SHA512
451087729a286693b4c7bf2d121858720126d11ff2752e287b4206601b3a4213d21ab59b225e0a7736fbfd83e1e6b45d62f22f896c28d03f8f4f74f29dd7c194
-
SSDEEP
3072:DpT1FUc3A3DR93HYVcn2ej37mDfWQlnCR3TAS0uJF:DpscyoDe8jlpqJF
Score9/10-
Contacts a large (1966729) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Writes file to system bin folder
-