General
-
Target
b3astmode.x86.elf
-
Size
22KB
-
Sample
241212-3zlc3asjat
-
MD5
873c6ba01596fdbb9c469fe1e0180243
-
SHA1
9236be2f17ba4d7422bf8f579d95c6226d3eaa48
-
SHA256
9959896b86d7dcb455c0f9d61ba74b19a3dc638ad08b51c4038ea5f092846170
-
SHA512
f218dc4f64b089abae03e2c996d016e71021cb353d35c034db147b4b083453085ee74273d119dc6e7440b5ccad2e00acaada435a10910a6af4a92f071a0ed1ee
-
SSDEEP
384:MtVLyqN/Dl5oEQGE7ezVwuGuhsmCX7gPjS1FY+9agANaNJawcudoD7UqeMN9xN:ME6/D/qGE7eBhsLrG+UynbcuyD7UM7X
Behavioral task
behavioral1
Sample
b3astmode.x86.elf
Resource
ubuntu2204-amd64-20240522.1-en
Malware Config
Extracted
mirai
UNST
Targets
-
-
Target
b3astmode.x86.elf
-
Size
22KB
-
MD5
873c6ba01596fdbb9c469fe1e0180243
-
SHA1
9236be2f17ba4d7422bf8f579d95c6226d3eaa48
-
SHA256
9959896b86d7dcb455c0f9d61ba74b19a3dc638ad08b51c4038ea5f092846170
-
SHA512
f218dc4f64b089abae03e2c996d016e71021cb353d35c034db147b4b083453085ee74273d119dc6e7440b5ccad2e00acaada435a10910a6af4a92f071a0ed1ee
-
SSDEEP
384:MtVLyqN/Dl5oEQGE7ezVwuGuhsmCX7gPjS1FY+9agANaNJawcudoD7UqeMN9xN:ME6/D/qGE7eBhsLrG+UynbcuyD7UM7X
Score10/10-
Mirai family
-
Contacts a large (71175) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Enumerates running processes
Discovers information about currently running processes on the system
-