General
-
Target
botnet.arm.elf
-
Size
35KB
-
Sample
241113-3vygtsvmdl
-
MD5
6a4e5e35ce65f48106f75266d91abb47
-
SHA1
6c7064721c97e4aa0fac8afab491b081381c28e6
-
SHA256
e1757c8fd0cfe73093e9ab4105f86e73f87faef58c35d5155a4bb34776a51170
-
SHA512
a761a4406313a59a5d81f07a52574fb4f234d83c29e7f39809c9c80c61adbc3361150b654e2a0a851198ecc152c03f871536f89d44e9963e745b5400fda77251
-
SSDEEP
768:PW2TCQ1qe4vcMRQSRC9kkrE1PfxVwtj6I5m1n7AeglWu0Jj3Uh:PW2epHUgU7E9Twh631no0Jc
Behavioral task
behavioral1
Sample
botnet.arm.elf
Resource
debian9-armhf-20240611-en
Malware Config
Extracted
mirai
MIRAI
Targets
-
-
Target
botnet.arm.elf
-
Size
35KB
-
MD5
6a4e5e35ce65f48106f75266d91abb47
-
SHA1
6c7064721c97e4aa0fac8afab491b081381c28e6
-
SHA256
e1757c8fd0cfe73093e9ab4105f86e73f87faef58c35d5155a4bb34776a51170
-
SHA512
a761a4406313a59a5d81f07a52574fb4f234d83c29e7f39809c9c80c61adbc3361150b654e2a0a851198ecc152c03f871536f89d44e9963e745b5400fda77251
-
SSDEEP
768:PW2TCQ1qe4vcMRQSRC9kkrE1PfxVwtj6I5m1n7AeglWu0Jj3Uh:PW2epHUgU7E9Twh631no0Jc
Score10/10-
Mirai family
-
Contacts a large (23515) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
File and Directory Permissions Modification
Adversaries may modify file or directory permissions to evade defenses.
-