General
-
Target
659a3f750bf48969cceb9a870716b5eb461e94b89ea7d447ac1ee65468b682a9.elf
-
Size
96KB
-
Sample
241221-c43j2azqfv
-
MD5
28072dae915931fce3b860dd02a617c3
-
SHA1
f78ce189ed76ad82d2e8faabef7f9358fd246454
-
SHA256
659a3f750bf48969cceb9a870716b5eb461e94b89ea7d447ac1ee65468b682a9
-
SHA512
184fd4dfd7cc0fb3bac71dee15ab50a266dfa730e8bbf531c67037e5381ec512049f7e05d1c7f843fce608f7fcc35e0b39eb57a612e59ef73ced34bade201466
-
SSDEEP
3072:i3VjdYsCmHubaQZ264gwrTye/7j8qvczh6H0:i3L7abaQZ264geTj7Yq66H0
Behavioral task
behavioral1
Sample
659a3f750bf48969cceb9a870716b5eb461e94b89ea7d447ac1ee65468b682a9.elf
Resource
debian9-armhf-20240611-en
Malware Config
Extracted
mirai
BOTNET
Targets
-
-
Target
659a3f750bf48969cceb9a870716b5eb461e94b89ea7d447ac1ee65468b682a9.elf
-
Size
96KB
-
MD5
28072dae915931fce3b860dd02a617c3
-
SHA1
f78ce189ed76ad82d2e8faabef7f9358fd246454
-
SHA256
659a3f750bf48969cceb9a870716b5eb461e94b89ea7d447ac1ee65468b682a9
-
SHA512
184fd4dfd7cc0fb3bac71dee15ab50a266dfa730e8bbf531c67037e5381ec512049f7e05d1c7f843fce608f7fcc35e0b39eb57a612e59ef73ced34bade201466
-
SSDEEP
3072:i3VjdYsCmHubaQZ264gwrTye/7j8qvczh6H0:i3L7abaQZ264geTj7Yq66H0
Score9/10-
Contacts a large (280388) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-