General
-
Target
61ee479993ea6342e20591591ab68285e33093ea9f6b2a18899c176b6aa4e800.elf
-
Size
70KB
-
Sample
241221-c4qkga1kgj
-
MD5
44606f7ee1e7deb82aad0922515c1e89
-
SHA1
f54245c696c4247f1b00e732883e16c3cf9f3934
-
SHA256
61ee479993ea6342e20591591ab68285e33093ea9f6b2a18899c176b6aa4e800
-
SHA512
747aee1ec2ac6cc1dc9abb184d65cb9958aed8d1ce32043b5c57e1611b69d1f7e587a35fd9f84b4127a2d39687b40c729b26514fa9e246acae52b449ad1e3061
-
SSDEEP
1536:Ml65jC3iUk7bk9dFN535t+uYPTvK0SOGFsoclkzk:Ml65jkk7gpN535EuYPTtG/zzk
Behavioral task
behavioral1
Sample
61ee479993ea6342e20591591ab68285e33093ea9f6b2a18899c176b6aa4e800.elf
Resource
debian9-armhf-20240611-en
Malware Config
Extracted
mirai
BOTNET
Targets
-
-
Target
61ee479993ea6342e20591591ab68285e33093ea9f6b2a18899c176b6aa4e800.elf
-
Size
70KB
-
MD5
44606f7ee1e7deb82aad0922515c1e89
-
SHA1
f54245c696c4247f1b00e732883e16c3cf9f3934
-
SHA256
61ee479993ea6342e20591591ab68285e33093ea9f6b2a18899c176b6aa4e800
-
SHA512
747aee1ec2ac6cc1dc9abb184d65cb9958aed8d1ce32043b5c57e1611b69d1f7e587a35fd9f84b4127a2d39687b40c729b26514fa9e246acae52b449ad1e3061
-
SSDEEP
1536:Ml65jC3iUk7bk9dFN535t+uYPTvK0SOGFsoclkzk:Ml65jkk7gpN535EuYPTtG/zzk
Score9/10-
Contacts a large (291461) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-