General
-
Target
1567-1-0x0000000008048000-0x0000000008058f28-memory.dmp
-
Size
61KB
-
Sample
241212-r5v9nszjdp
-
MD5
b9277588d906966b8eb8efdf44721fed
-
SHA1
141ee5ee5ff2a62f4651a8e58c8e388c07be61f9
-
SHA256
c8986532f06833c7746e9cdfba244deae70ff32a54ced320c7c7db6c8a59e8c4
-
SHA512
8f02bffcc4ef6819bee80dd380171a3e4b1cc4480a9864de9033df4dbe1b9afbd3ba2239f3c22b2cd6f52d044ffa026fa82ab2daa5bddd1f535f9e397e3dfc8a
-
SSDEEP
1536:vHB4xFZaeHW41ghY8FK3Y9/lA3DAOg9iV8VfDV0qOuucYv1P3lp9ibPK0k:vHB4xFZaeHW41ghY8FK3SW38OBSVfDeb
Behavioral task
behavioral1
Sample
1567-1-0x0000000008048000-0x0000000008058f28-memory.dmp
Resource
ubuntu1804-amd64-20240611-en
Malware Config
Extracted
mirai
BOTNET
Targets
-
-
Target
1567-1-0x0000000008048000-0x0000000008058f28-memory.dmp
-
Size
61KB
-
MD5
b9277588d906966b8eb8efdf44721fed
-
SHA1
141ee5ee5ff2a62f4651a8e58c8e388c07be61f9
-
SHA256
c8986532f06833c7746e9cdfba244deae70ff32a54ced320c7c7db6c8a59e8c4
-
SHA512
8f02bffcc4ef6819bee80dd380171a3e4b1cc4480a9864de9033df4dbe1b9afbd3ba2239f3c22b2cd6f52d044ffa026fa82ab2daa5bddd1f535f9e397e3dfc8a
-
SSDEEP
1536:vHB4xFZaeHW41ghY8FK3Y9/lA3DAOg9iV8VfDV0qOuucYv1P3lp9ibPK0k:vHB4xFZaeHW41ghY8FK3SW38OBSVfDeb
Score9/10-
Contacts a large (111802) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-