General
-
Target
meerkat.x86.elf
-
Size
73KB
-
Sample
241112-x8yf4azbqf
-
MD5
1fb69900d79f2d1fa80b89a352a7545a
-
SHA1
95d8537b51ba65fb7b97567d2dc7cc04a677e1ab
-
SHA256
61fa903ce9d7a88e55f1361f706731511fb0647e73b7272fdb90284d2af4a4d5
-
SHA512
1025605866c2334bc1ae4869b292632e5503b420173ca10f51205c7a031dd323641cebcb7ed6f87b51b5227cb2b4a2504125588316342c3d5f9b9df8787d7dc9
-
SSDEEP
1536:pWq2VcPy61MQW1RSoM4vn0xR+B7sPOykaL8/qhsA70C6uyK/omCrmA/Srr:LpPyQMQW1RSoPvn0xR+B7sPOykaY/Chj
Behavioral task
behavioral1
Sample
meerkat.x86.elf
Resource
ubuntu2204-amd64-20240611-en
Malware Config
Extracted
mirai
LZRD
Targets
-
-
Target
meerkat.x86.elf
-
Size
73KB
-
MD5
1fb69900d79f2d1fa80b89a352a7545a
-
SHA1
95d8537b51ba65fb7b97567d2dc7cc04a677e1ab
-
SHA256
61fa903ce9d7a88e55f1361f706731511fb0647e73b7272fdb90284d2af4a4d5
-
SHA512
1025605866c2334bc1ae4869b292632e5503b420173ca10f51205c7a031dd323641cebcb7ed6f87b51b5227cb2b4a2504125588316342c3d5f9b9df8787d7dc9
-
SSDEEP
1536:pWq2VcPy61MQW1RSoM4vn0xR+B7sPOykaL8/qhsA70C6uyK/omCrmA/Srr:LpPyQMQW1RSoPvn0xR+B7sPOykaY/Chj
Score9/10-
Contacts a large (23992) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Enumerates running processes
Discovers information about currently running processes on the system
-