General
-
Target
loligang.x86.elf
-
Size
68KB
-
Sample
241129-jevapatjez
-
MD5
925d9ba2be0c9060768c5dddab51d914
-
SHA1
77e238e2321f53ee264fdc85e5a2314c7c28e0e0
-
SHA256
029cc33763810440e92dd29c71fbd61cde22f8146fb27bdfd0891b66529d4cff
-
SHA512
f1dc2597394d739932abe6439d3966ed741d82f43b8e60739ba3c9b3d821481d324ace834aa8724ddcc989f4ec5931234cb2554a765fe976c705e374d64659fa
-
SSDEEP
1536:DHiwVw+q60EUNWRQ7k86NL/gAfh7pSWE/2wQhWrTS/MoAFCA3UVIliggg:ewVw160EUNWRQ7k86N7gQ7pSWE/VSWrq
Malware Config
Extracted
mirai
LZRD
Targets
-
-
Target
loligang.x86.elf
-
Size
68KB
-
MD5
925d9ba2be0c9060768c5dddab51d914
-
SHA1
77e238e2321f53ee264fdc85e5a2314c7c28e0e0
-
SHA256
029cc33763810440e92dd29c71fbd61cde22f8146fb27bdfd0891b66529d4cff
-
SHA512
f1dc2597394d739932abe6439d3966ed741d82f43b8e60739ba3c9b3d821481d324ace834aa8724ddcc989f4ec5931234cb2554a765fe976c705e374d64659fa
-
SSDEEP
1536:DHiwVw+q60EUNWRQ7k86NL/gAfh7pSWE/2wQhWrTS/MoAFCA3UVIliggg:ewVw160EUNWRQ7k86N7gQ7pSWE/VSWrq
-
Contacts a large (20362) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-