General
-
Target
664-1-0x00008000-0x00023af4-memory.dmp
-
Size
76KB
-
Sample
241212-r6zcqazjgn
-
MD5
08b3b52105f20ea93d3910e408e223c2
-
SHA1
4693041e56cc439b3d4cd2aeaf5aead350216ee0
-
SHA256
fcd8a6fc9e1bab10ffd2934270702658d9b5e93eb04c67f8583b174013a5799f
-
SHA512
ed876be96f01b6ba9351d9a9e1d2a1d81aa594d038e2b4a1d3186baae7bf83d0e0580bde644d1b6d7b563f81a138a53509cf4ffb91425897aaf47f96b874c79e
-
SSDEEP
1536:RXnxKAS+zOpv3hVV+ztrIVc2WSON60MupaT9Wf6d/cn9SS1OI5w8vYULrkOhe5U7:9zOpzVRySdTgf6d/cn9h13L8DM
Behavioral task
behavioral1
Sample
664-1-0x00008000-0x00023af4-memory.dmp
Resource
debian12-armhf-20240221-en
Malware Config
Extracted
mirai
BOTNET
Targets
-
-
Target
664-1-0x00008000-0x00023af4-memory.dmp
-
Size
76KB
-
MD5
08b3b52105f20ea93d3910e408e223c2
-
SHA1
4693041e56cc439b3d4cd2aeaf5aead350216ee0
-
SHA256
fcd8a6fc9e1bab10ffd2934270702658d9b5e93eb04c67f8583b174013a5799f
-
SHA512
ed876be96f01b6ba9351d9a9e1d2a1d81aa594d038e2b4a1d3186baae7bf83d0e0580bde644d1b6d7b563f81a138a53509cf4ffb91425897aaf47f96b874c79e
-
SSDEEP
1536:RXnxKAS+zOpv3hVV+ztrIVc2WSON60MupaT9Wf6d/cn9SS1OI5w8vYULrkOhe5U7:9zOpzVRySdTgf6d/cn9h13L8DM
Score9/10-
Contacts a large (112325) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-