General
-
Target
536e51ec95627d4b8dc490b09f9040ea631ec39036c54c38011cd54cd30728f2.elf
-
Size
74KB
-
Sample
241221-c19tyazqat
-
MD5
27b40722b613462f4eb5678c6c9ff87d
-
SHA1
249b2471f0cf738a36e5f31593e26e4d4897962f
-
SHA256
536e51ec95627d4b8dc490b09f9040ea631ec39036c54c38011cd54cd30728f2
-
SHA512
a064f9ec1d728730a161f6eedf936efee956e73886a86518e864d5ca9595db0c52394a2c28b9108e0de6322eda5975a0e468596b2fdcb848d70f0fc8856d2d48
-
SSDEEP
1536:wnzvrykfl/kkqbk9dFI5625tx2G+mfpdy3SdnV6c4OV2vdzk:wz+kfekqgpI5625/2G+mBtgdzk
Behavioral task
behavioral1
Sample
536e51ec95627d4b8dc490b09f9040ea631ec39036c54c38011cd54cd30728f2.elf
Resource
debian9-armhf-20240611-en
Malware Config
Extracted
mirai
BOTNET
Targets
-
-
Target
536e51ec95627d4b8dc490b09f9040ea631ec39036c54c38011cd54cd30728f2.elf
-
Size
74KB
-
MD5
27b40722b613462f4eb5678c6c9ff87d
-
SHA1
249b2471f0cf738a36e5f31593e26e4d4897962f
-
SHA256
536e51ec95627d4b8dc490b09f9040ea631ec39036c54c38011cd54cd30728f2
-
SHA512
a064f9ec1d728730a161f6eedf936efee956e73886a86518e864d5ca9595db0c52394a2c28b9108e0de6322eda5975a0e468596b2fdcb848d70f0fc8856d2d48
-
SSDEEP
1536:wnzvrykfl/kkqbk9dFI5625tx2G+mfpdy3SdnV6c4OV2vdzk:wz+kfekqgpI5625/2G+mBtgdzk
Score9/10-
Contacts a large (260953) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-