General
-
Target
x86_64.elf
-
Size
28KB
-
Sample
241211-1q284stqfr
-
MD5
9cc970e0631afa61a049848f4f368b12
-
SHA1
54d7d99f436e9c97da5bfdd43698bb1dbd679b29
-
SHA256
681951c3fa70c2d14fe48e3c829f9f62f04f8fa9b430c0a87e849e397333dc16
-
SHA512
9f5bcd759af164b0e22479d44806dce6d3ca3e2b62fa3ac154b83111804cd1ee1df4b549fff0e8ab72d2a2d66dadb0f8f1cc301fee83a711e5c4055c2ee3567e
-
SSDEEP
768:UlmwYncmzvo2+XA9rVVTe0OoLEyFpX+pN2MX:UzYnvzxpVFeToR7X+pkMX
Behavioral task
behavioral1
Sample
x86_64.elf
Resource
ubuntu2204-amd64-20240611-en
Malware Config
Extracted
mirai
BOTNET
Targets
-
-
Target
x86_64.elf
-
Size
28KB
-
MD5
9cc970e0631afa61a049848f4f368b12
-
SHA1
54d7d99f436e9c97da5bfdd43698bb1dbd679b29
-
SHA256
681951c3fa70c2d14fe48e3c829f9f62f04f8fa9b430c0a87e849e397333dc16
-
SHA512
9f5bcd759af164b0e22479d44806dce6d3ca3e2b62fa3ac154b83111804cd1ee1df4b549fff0e8ab72d2a2d66dadb0f8f1cc301fee83a711e5c4055c2ee3567e
-
SSDEEP
768:UlmwYncmzvo2+XA9rVVTe0OoLEyFpX+pN2MX:UzYnvzxpVFeToR7X+pkMX
Score10/10-
Mirai family
-
Contacts a large (113093) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Enumerates running processes
Discovers information about currently running processes on the system
-