General
-
Target
nshkmpsl.elf
-
Size
95KB
-
Sample
241220-v9en9s1ndj
-
MD5
7d5ac43f1458b7fe68f24287f9732fa8
-
SHA1
6f71e0c62e1bb10cfbfd0aae0606009cd79fe019
-
SHA256
37257ac4ac699fd4b99d3ccc48cc79bc65194d4f400c13faf026218396cf14da
-
SHA512
282e103cd331016d2df58543a37f3b8ab3ec073edcf88b8b1451330d34b45e2f79ef108eb27bae191eae4c336f97e842be239cc87ee509cb4ee23bfe071454e1
-
SSDEEP
1536:XJwbamjisDu7Xj0coVRolo5Ce3El0mqB+ZPEfKELUpiYwuV04ozd:XJca62TxBeUl0mW+Fwkozd
Behavioral task
behavioral1
Sample
nshkmpsl.elf
Resource
debian12-mipsel-20240221-en
Malware Config
Extracted
mirai
BOTNET
Targets
-
-
Target
nshkmpsl.elf
-
Size
95KB
-
MD5
7d5ac43f1458b7fe68f24287f9732fa8
-
SHA1
6f71e0c62e1bb10cfbfd0aae0606009cd79fe019
-
SHA256
37257ac4ac699fd4b99d3ccc48cc79bc65194d4f400c13faf026218396cf14da
-
SHA512
282e103cd331016d2df58543a37f3b8ab3ec073edcf88b8b1451330d34b45e2f79ef108eb27bae191eae4c336f97e842be239cc87ee509cb4ee23bfe071454e1
-
SSDEEP
1536:XJwbamjisDu7Xj0coVRolo5Ce3El0mqB+ZPEfKELUpiYwuV04ozd:XJca62TxBeUl0mW+Fwkozd
Score9/10-
Contacts a large (267603) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-