General
-
Target
1589-1-0x0000000000400000-0x0000000000610ca0-memory.dmp
-
Size
64KB
-
Sample
241212-sdyfdszlfm
-
MD5
a5eb35fa155aec4f872a5c752d1b7b83
-
SHA1
81577c857bf855339c645122e7261b77a145cf32
-
SHA256
110bf5dbc26ca732a7fb8243fe4fbc01901b00316740e3fd1233b873e43fee7e
-
SHA512
9179d08c932a6069310284b53892fe3be48538a930ea16d52055212e01c1144e28915db871cda429efad73b07f71ff48e5845add9185e060c0afdb5095b1680a
-
SSDEEP
768:6z9wYLdOQfNMe7PCP7eI3lJUxdUCKa5TENMqKAbFJD4sfIwlILlBkMsU99:0d5jieMqI1JSdwYCeAxJDhfhlILkRUv
Behavioral task
behavioral1
Sample
1589-1-0x0000000000400000-0x0000000000610ca0-memory.dmp
Resource
ubuntu2204-amd64-20240611-en
Malware Config
Extracted
mirai
BOTNET
Targets
-
-
Target
1589-1-0x0000000000400000-0x0000000000610ca0-memory.dmp
-
Size
64KB
-
MD5
a5eb35fa155aec4f872a5c752d1b7b83
-
SHA1
81577c857bf855339c645122e7261b77a145cf32
-
SHA256
110bf5dbc26ca732a7fb8243fe4fbc01901b00316740e3fd1233b873e43fee7e
-
SHA512
9179d08c932a6069310284b53892fe3be48538a930ea16d52055212e01c1144e28915db871cda429efad73b07f71ff48e5845add9185e060c0afdb5095b1680a
-
SSDEEP
768:6z9wYLdOQfNMe7PCP7eI3lJUxdUCKa5TENMqKAbFJD4sfIwlILlBkMsU99:0d5jieMqI1JSdwYCeAxJDhfhlILkRUv
Score9/10-
Contacts a large (114098) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Enumerates running processes
Discovers information about currently running processes on the system
-