General
-
Target
b7b4caac8d9975695170139441bec806cfbd3d20bb9fad56dc0afdf8cb00e5a1.elf
-
Size
45KB
-
Sample
241216-c4mhta1per
-
MD5
c5dad34705dc4d1776dd1361539222bf
-
SHA1
8e4205c745533214d8176e7a607eddbacb914100
-
SHA256
b7b4caac8d9975695170139441bec806cfbd3d20bb9fad56dc0afdf8cb00e5a1
-
SHA512
e5e31e5643ea5803b8b13fcfef78a9c47196910a8416e0d74eb0e85798f9e67ce91f1440447b02e1d2fb412e06c6a0dcd9877d6608374757c2d2ea3cb05a72b4
-
SSDEEP
768:QZnNjwqwQm+Gnw/1Tzk96RFuEVP1OXoWQRs5DHzUIfumpDieIA+Si62yfot/Ox2/:QZn7wQmXnq1TIYFhVP1O4WQy5DHzJPHW
Behavioral task
behavioral1
Sample
b7b4caac8d9975695170139441bec806cfbd3d20bb9fad56dc0afdf8cb00e5a1.elf
Resource
debian9-armhf-20240611-en
Malware Config
Extracted
mirai
BOTNET
Targets
-
-
Target
b7b4caac8d9975695170139441bec806cfbd3d20bb9fad56dc0afdf8cb00e5a1.elf
-
Size
45KB
-
MD5
c5dad34705dc4d1776dd1361539222bf
-
SHA1
8e4205c745533214d8176e7a607eddbacb914100
-
SHA256
b7b4caac8d9975695170139441bec806cfbd3d20bb9fad56dc0afdf8cb00e5a1
-
SHA512
e5e31e5643ea5803b8b13fcfef78a9c47196910a8416e0d74eb0e85798f9e67ce91f1440447b02e1d2fb412e06c6a0dcd9877d6608374757c2d2ea3cb05a72b4
-
SSDEEP
768:QZnNjwqwQm+Gnw/1Tzk96RFuEVP1OXoWQRs5DHzUIfumpDieIA+Si62yfot/Ox2/:QZn7wQmXnq1TIYFhVP1O4WQy5DHzJPHW
Score9/10-
Contacts a large (703317) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-