General
-
Target
main_x86.elf
-
Size
44KB
-
Sample
241206-fqqj4axmhj
-
MD5
cbd31095fc9ce62c02b04ed61eaee1a6
-
SHA1
e6a5df104379db435807ba2b89d728291327947e
-
SHA256
71fec85ddee9e66b50341b0494d92b25333b1e148c14490fdc2e03f97173f09c
-
SHA512
fece8e04c78a54a11c66710fd92ff2f40ee5186d655ac63d5ae379730aaf709240bdcb9aa8889446fef7e24686189ad1ea1cb6477fa2f91a25aaa964517268aa
-
SSDEEP
768:yHHmunAhv1xoS24usX6Vrpv3htyfoGE4mLWPYlBCH+g3acygH:yHHRnAhv/oS24hXQpv5GEAPYfCeg3Jym
Behavioral task
behavioral1
Sample
main_x86.elf
Resource
ubuntu2004-amd64-20241127-en
Malware Config
Extracted
mirai
SORA
Targets
-
-
Target
main_x86.elf
-
Size
44KB
-
MD5
cbd31095fc9ce62c02b04ed61eaee1a6
-
SHA1
e6a5df104379db435807ba2b89d728291327947e
-
SHA256
71fec85ddee9e66b50341b0494d92b25333b1e148c14490fdc2e03f97173f09c
-
SHA512
fece8e04c78a54a11c66710fd92ff2f40ee5186d655ac63d5ae379730aaf709240bdcb9aa8889446fef7e24686189ad1ea1cb6477fa2f91a25aaa964517268aa
-
SSDEEP
768:yHHmunAhv1xoS24usX6Vrpv3htyfoGE4mLWPYlBCH+g3acygH:yHHRnAhv/oS24hXQpv5GEAPYfCeg3Jym
Score9/10-
Contacts a large (73678) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Enumerates running processes
Discovers information about currently running processes on the system
-