General
-
Target
botnet.arm7.elf
-
Size
61KB
-
Sample
241113-3st2ma1grr
-
MD5
b5c3047b6f517981a80e6e8910f97e7f
-
SHA1
e63b84208378269256923b55ae761800207c0e7e
-
SHA256
e2ebaa64590a5ee4249be1380fc0ab8386a9e425cabb4646028d69fb502ccc17
-
SHA512
554bffaeb5ca19eb36776bb01a3a2e793cb63e4ee23eaa8d3c258d94124a04b5e0c6b496c119f387826fe3afde9fec395ad1b41487076fb18b94cd435fbcb31f
-
SSDEEP
1536:gz3fTxnj8Uz2WY4aubeMIR02jRp13D0SOj5fiU:GrxjzztY4FgRntyliU
Behavioral task
behavioral1
Sample
botnet.arm7.elf
Resource
debian9-armhf-20240611-en
Malware Config
Extracted
mirai
MIRAI
Targets
-
-
Target
botnet.arm7.elf
-
Size
61KB
-
MD5
b5c3047b6f517981a80e6e8910f97e7f
-
SHA1
e63b84208378269256923b55ae761800207c0e7e
-
SHA256
e2ebaa64590a5ee4249be1380fc0ab8386a9e425cabb4646028d69fb502ccc17
-
SHA512
554bffaeb5ca19eb36776bb01a3a2e793cb63e4ee23eaa8d3c258d94124a04b5e0c6b496c119f387826fe3afde9fec395ad1b41487076fb18b94cd435fbcb31f
-
SSDEEP
1536:gz3fTxnj8Uz2WY4aubeMIR02jRp13D0SOj5fiU:GrxjzztY4FgRntyliU
Score10/10-
Mirai family
-
Contacts a large (23511) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
File and Directory Permissions Modification
Adversaries may modify file or directory permissions to evade defenses.
-