General
-
Target
iwir64.elf
-
Size
163KB
-
Sample
241114-kwky1szndj
-
MD5
86051ed9f16a14e387d8f1ca49929b8b
-
SHA1
9bc8d6e8198830b082e26727a6a4f787108d3186
-
SHA256
a282594c2838e6676dae420eb09052b30f7a3366bf0dc98af3ff11d87c247c16
-
SHA512
88ccc46876991b423236a99aaaee85deb714557d1fc439a15aaaad0af0f7e428f42d3eb7fccc8b11c6d3121297cf45de08293c905a9c4938b3a893afc80a0096
-
SSDEEP
3072:tQymKVauA93NInXoluIvOQz14injyUOrCeWwoWpps+PMsexs:myXVauA93NIn4lu0MWVWr+xs
Behavioral task
behavioral1
Sample
iwir64.elf
Resource
ubuntu2404-amd64-20240523-en
Malware Config
Extracted
mirai
SORA
Targets
-
-
Target
iwir64.elf
-
Size
163KB
-
MD5
86051ed9f16a14e387d8f1ca49929b8b
-
SHA1
9bc8d6e8198830b082e26727a6a4f787108d3186
-
SHA256
a282594c2838e6676dae420eb09052b30f7a3366bf0dc98af3ff11d87c247c16
-
SHA512
88ccc46876991b423236a99aaaee85deb714557d1fc439a15aaaad0af0f7e428f42d3eb7fccc8b11c6d3121297cf45de08293c905a9c4938b3a893afc80a0096
-
SSDEEP
3072:tQymKVauA93NInXoluIvOQz14injyUOrCeWwoWpps+PMsexs:myXVauA93NIn4lu0MWVWr+xs
Score9/10-
Contacts a large (49709) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Enumerates running processes
Discovers information about currently running processes on the system
-