Overview
overview
10Static
static
1027960730119663739
ubuntu-18.04-amd64
27960730119663739
debian-9-armhf
27960730119663739
debian-9-mips
27960730119663739
debian-9-mipsel
32825050225637941
debian-9-mips
735616602442412040
debian-9-armhf
640378277128495512
ubuntu-18.04-amd64
40378277128495512
debian-9-armhf
40378277128495512
debian-9-mips
40378277128495512
debian-9-mipsel
45331149853509989.apk
android-9-x86
145331149853509989.apk
android-10-x64
145331149853509989.apk
android-11-x64
156618521379097511
debian-12-armhf
799971917023891412.exe
windows7-x64
1099971917023891412.exe
windows10-2004-x64
10General
-
Target
c01b1e7fdd3f14fd99523c71da4ce97497b4262065a6f29d9251b26cab7e03bb.tar
-
Size
10.2MB
-
Sample
240925-qthzja1ejd
-
MD5
a4d9843cc8166e0543d309cc47e3f46a
-
SHA1
d7612c1831b3321e97d890de0387df12b5c57fa3
-
SHA256
c01b1e7fdd3f14fd99523c71da4ce97497b4262065a6f29d9251b26cab7e03bb
-
SHA512
5a3ee382f32e3e3e5058a56841ab71441f23bf250784563e68fa84c1638bcc5762335432d118b7996c323162f8d8bf980bc1042ccc7ac91f13cc6f871c54afa3
-
SSDEEP
196608:RDH6rsox3zJUEKBHjVoeW3+Jp3wkETTV0wRDByc9YZSrd+TDD:BaQoEHBoeW3Ap3wkoTV0pKYZSZ+Tv
Behavioral task
behavioral1
Sample
27960730119663739
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral2
Sample
27960730119663739
Resource
debian9-armhf-20240729-en
Behavioral task
behavioral3
Sample
27960730119663739
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral4
Sample
27960730119663739
Resource
debian9-mipsel-20240611-en
Behavioral task
behavioral5
Sample
32825050225637941
Resource
debian9-mipsbe-20240729-en
Behavioral task
behavioral6
Sample
35616602442412040
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral7
Sample
40378277128495512
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral8
Sample
40378277128495512
Resource
debian9-armhf-20240729-en
Behavioral task
behavioral9
Sample
40378277128495512
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral10
Sample
40378277128495512
Resource
debian9-mipsel-20240418-en
Behavioral task
behavioral11
Sample
45331149853509989.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral12
Sample
45331149853509989.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral13
Sample
45331149853509989.apk
Resource
android-x64-arm64-20240624-en
Behavioral task
behavioral14
Sample
56618521379097511
Resource
debian12-armhf-20240729-en
Behavioral task
behavioral15
Sample
99971917023891412.exe
Resource
win7-20240903-en
Malware Config
Extracted
gafgyt
255.255.255.255:1900
194.48.250.133:23
Extracted
mirai
hou.zu0x.com
Extracted
mirai
CHARYBDIS
216.219.94.5
216.219.94.57
Extracted
risepro
193.233.132.49:50500
Targets
-
-
Target
27960730119663739
-
Size
85KB
-
MD5
4f8c2f12d1eb4961813d21d9abf6dc2d
-
SHA1
f6b2ee4baf47335288d8ed5fc538a49822edbbb5
-
SHA256
e0f54d1599e7bbfc47af48d1de7665a01a5e6b3f6e0cc29d98782c6d995b1394
-
SHA512
7d7d7a84ea3b0ecdb89f55e39dca057f408b2e76f1b38f58043148c36007fc6aa94ce9e7c8308f7ad880f0dbd59ed2c62e5624801e4cd8ffd7f92a154bc12c9d
-
SSDEEP
1536:AamwtHJfIP6A8+Uc4HjCbsPdkyOGit5K4KxPFY1Jrb4VxCE2M16y+:At+IP6+Iu5GW5K/x44VxV1I
Score1/10 -
-
-
Target
32825050225637941
-
Size
71KB
-
MD5
1b2d3d937052ac1d989a7e5bfd9d28f6
-
SHA1
5979c7ac4862133628386135a845893d38e218bb
-
SHA256
718cb76210b528fe1eddf533a352a2f4583957a0f4144a9b6389c600273bf6be
-
SHA512
89f454a499a1e6e3010a57315f9ed11324813b39638fcc843778c75e163c85bd36d8d0b32839487c7979cf194dd99a7e0451ab03bb31257eb257453782bd1489
-
SSDEEP
768:TLGl3o5UaqLQqeuuBLvDn9N1FdVtlb/T3etCj/zGxcLso+kw6R2CC76t16v219/A:TD5bdw6Q77yd5Lehk0oXAH
Score7/10-
Deletes itself
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Enumerates running processes
Discovers information about currently running processes on the system
-
-
-
Target
35616602442412040
-
Size
385KB
-
MD5
b27315d7b16e45c1ed5dadb86bed7280
-
SHA1
eba49957cc5f7933aed7deee0fd798abd7ddca55
-
SHA256
f26910f97d3e1ba27299a5b3e05c6a344dd80a8d84ceb5288723ab5e3c3b7753
-
SHA512
71e026059e9026af839e6584d450a061239abaf39bd1f3deba8e63e28850d68a10d1a4891d8aae8328468b7fb57116a12b6a43bd0f9d4dc4d5c0180616a749bc
-
SSDEEP
6144:Z6xeJy0ykZ1e5hhdO1j33ZWPBmhGQQTvD0R/bl:Z6xeJy7GI5hOjHOmhGQQvD0R/bl
Score6/10 -
-
-
Target
40378277128495512
-
Size
85KB
-
MD5
4f8c2f12d1eb4961813d21d9abf6dc2d
-
SHA1
f6b2ee4baf47335288d8ed5fc538a49822edbbb5
-
SHA256
e0f54d1599e7bbfc47af48d1de7665a01a5e6b3f6e0cc29d98782c6d995b1394
-
SHA512
7d7d7a84ea3b0ecdb89f55e39dca057f408b2e76f1b38f58043148c36007fc6aa94ce9e7c8308f7ad880f0dbd59ed2c62e5624801e4cd8ffd7f92a154bc12c9d
-
SSDEEP
1536:AamwtHJfIP6A8+Uc4HjCbsPdkyOGit5K4KxPFY1Jrb4VxCE2M16y+:At+IP6+Iu5GW5K/x44VxV1I
Score1/10 -
-
-
Target
45331149853509989
-
Size
2.9MB
-
MD5
f859a0b06d2eaf5b7916755c0ab0f8a2
-
SHA1
26fa0aef74b9914f302bf8bf01c8ce82043d410b
-
SHA256
ff20608f0d92ae1c6af3b4170e7627e1f292845df8d943a5bd3117fff04c1650
-
SHA512
3961ccc0329b567383f9598abb2f900deea79865bf10d99f8615f234a82fdaa2ac7b6bcf3e13e97b7e4127627157c12bd3708b6cd9e856bdde08344338542187
-
SSDEEP
49152:ounwv2WHwr9tZ6ekkLL5Tk9oxp1RxJVJgda5KBH4UJk95IuyVWU/qEE0nWXPJ:oxvLH6NpkkZ+ox3RxJUEKBHJJk9oVNxs
Score1/10 -
-
-
Target
56618521379097511
-
Size
191KB
-
MD5
1e93874a2e62119775e545c413b6c168
-
SHA1
33e471c1622ef34d4d3e681a570af22b4a17bd19
-
SHA256
2d894d197ce20ac34f74d35eafb11605efc3dc6ea286dd6c1a2f3542bf75db21
-
SHA512
7f8b606aff6319104392436628485365cf2de94b9dcddca5dc0c596120a1b46ea3ceea8a903f8b0e027e457b6f79dd8125e11108390c6fe25dace28dd5c939d3
-
SSDEEP
3072:K+Ag8mGa4ybxHot+ykaTs/eNBHONTEfIg6tLUbt8k8iKkoEM/9y2VLXmFj35VTK:K+ZQapl5aTs/eNBHOREEypKkrM/9y2RT
Score7/10-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Enumerates running processes
Discovers information about currently running processes on the system
-
Reads process memory
Read the memory of a process through the /proc virtual filesystem. This can be used to steal credentials.
-
-
-
Target
99971917023891412
-
Size
6.5MB
-
MD5
6c445fd49061f4c9849fa6fecb3ecea8
-
SHA1
d7cd4c01cd9afc838a1e657925153bf219eee41d
-
SHA256
9e303948d961216b83748b22811d3f0b287d8c22040ae24f5a618b5866d96719
-
SHA512
4958c04e6b201d0dfed9a72235dddb8752becbebd53ecdc79878abf5a4e72939d09ce504c44b6cd6ce0a740bf0c793e21bef330a94ec0e9443c4d3a12287e181
-
SSDEEP
98304:KG7JJLb33yLkX0JlTVWZVr76RDBY4ScF/VbBYZKrrd+TDfcOCbhxNGYOQ2fx:K+Jp3wkETTV0wRDByc9YZSrd+TDD
-