General
-
Target
aae9d2a9669849b09b4e8ed8f3baeeb4c948ca80ebddd5004a57c2b6b7049fc9.elf
-
Size
32KB
-
Sample
241212-c4h6dsxngz
-
MD5
bf55d7061cedeb10e6a3839353dc6d8c
-
SHA1
34b773230a77570ef0c6fced5ab9f125996e4daf
-
SHA256
aae9d2a9669849b09b4e8ed8f3baeeb4c948ca80ebddd5004a57c2b6b7049fc9
-
SHA512
555f6dec792e49927d5392fc8dae5174e8868c9acdddebd4d0a5b3386352df40c7342a82d0973979cdb5061ee347f4ebd33ce19ab98fbb6dcae293e1eb69c57e
-
SSDEEP
768:GWo0SuKqmi7AY8GMnX7Md+Swn41BSYECR3Wzb9q3UELKIA:ZopuLm7jRw+Sw41wO26LE
Behavioral task
behavioral1
Sample
aae9d2a9669849b09b4e8ed8f3baeeb4c948ca80ebddd5004a57c2b6b7049fc9.elf
Resource
debian9-armhf-20240611-en
Malware Config
Extracted
mirai
BOTNET
Targets
-
-
Target
aae9d2a9669849b09b4e8ed8f3baeeb4c948ca80ebddd5004a57c2b6b7049fc9.elf
-
Size
32KB
-
MD5
bf55d7061cedeb10e6a3839353dc6d8c
-
SHA1
34b773230a77570ef0c6fced5ab9f125996e4daf
-
SHA256
aae9d2a9669849b09b4e8ed8f3baeeb4c948ca80ebddd5004a57c2b6b7049fc9
-
SHA512
555f6dec792e49927d5392fc8dae5174e8868c9acdddebd4d0a5b3386352df40c7342a82d0973979cdb5061ee347f4ebd33ce19ab98fbb6dcae293e1eb69c57e
-
SSDEEP
768:GWo0SuKqmi7AY8GMnX7Md+Swn41BSYECR3Wzb9q3UELKIA:ZopuLm7jRw+Sw41wO26LE
Score10/10-
Mirai family
-
Contacts a large (106759) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-