General
-
Target
501998de1bcf45cc89b2fa044c0f0a6d5fad8487896b2ec6efcd4781c9b4ff92.elf
-
Size
102KB
-
Sample
241009-by7fcstcmf
-
MD5
70b66a570de870a13347439c61de40bd
-
SHA1
8b747eb73adc30dda05a1f76c0c0700881d70f5b
-
SHA256
501998de1bcf45cc89b2fa044c0f0a6d5fad8487896b2ec6efcd4781c9b4ff92
-
SHA512
7514bce3a8798f1b0ee8370807377f274256c80b4a8e5c64aff03de5921fe5c3b0a100839d4f427090d75f20c3c92ba65f460c8424786ba7e5e4c0d2a51a6a9b
-
SSDEEP
3072:rgLIgB0mpC+wmNBU82+OfR8+bMZutwntYH:rzgB0mpCDmNsJ8+bMZutv
Behavioral task
behavioral1
Sample
501998de1bcf45cc89b2fa044c0f0a6d5fad8487896b2ec6efcd4781c9b4ff92.elf
Resource
debian9-mipsbe-20240729-en
Malware Config
Extracted
mirai
ECCHI
Targets
-
-
Target
501998de1bcf45cc89b2fa044c0f0a6d5fad8487896b2ec6efcd4781c9b4ff92.elf
-
Size
102KB
-
MD5
70b66a570de870a13347439c61de40bd
-
SHA1
8b747eb73adc30dda05a1f76c0c0700881d70f5b
-
SHA256
501998de1bcf45cc89b2fa044c0f0a6d5fad8487896b2ec6efcd4781c9b4ff92
-
SHA512
7514bce3a8798f1b0ee8370807377f274256c80b4a8e5c64aff03de5921fe5c3b0a100839d4f427090d75f20c3c92ba65f460c8424786ba7e5e4c0d2a51a6a9b
-
SSDEEP
3072:rgLIgB0mpC+wmNBU82+OfR8+bMZutwntYH:rzgB0mpCDmNsJ8+bMZutv
Score9/10-
Contacts a large (71331) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Reads process memory
Read the memory of a process through the /proc virtual filesystem. This can be used to steal credentials.
-