General
-
Target
8f42b01d0fef5ad497a6c21748cdda518ca16d24e6b00fc60e6619c1579c1fcd.elf
-
Size
69KB
-
Sample
241221-db36ja1mhj
-
MD5
dba94c12af61c09af2fd44b158b7497f
-
SHA1
5e0234344adf2d109cdee2c8f026c94a583c0e45
-
SHA256
8f42b01d0fef5ad497a6c21748cdda518ca16d24e6b00fc60e6619c1579c1fcd
-
SHA512
fbfee022eb760f01b161ee85081fc049fb6b1b4e108732960d51c6b72e45a6d1fd5b4eedfa058b3b5245f81215d16091805dd7c0a765fed45e7851b11ea96589
-
SSDEEP
1536:AiZ7CEQBUky+k9dhb59gitgHtB0D+8boZnR5zk:AipKUkyfVb59giGHtB07bCXzk
Behavioral task
behavioral1
Sample
8f42b01d0fef5ad497a6c21748cdda518ca16d24e6b00fc60e6619c1579c1fcd.elf
Resource
debian9-armhf-20240729-en
Malware Config
Extracted
mirai
BOTNET
Targets
-
-
Target
8f42b01d0fef5ad497a6c21748cdda518ca16d24e6b00fc60e6619c1579c1fcd.elf
-
Size
69KB
-
MD5
dba94c12af61c09af2fd44b158b7497f
-
SHA1
5e0234344adf2d109cdee2c8f026c94a583c0e45
-
SHA256
8f42b01d0fef5ad497a6c21748cdda518ca16d24e6b00fc60e6619c1579c1fcd
-
SHA512
fbfee022eb760f01b161ee85081fc049fb6b1b4e108732960d51c6b72e45a6d1fd5b4eedfa058b3b5245f81215d16091805dd7c0a765fed45e7851b11ea96589
-
SSDEEP
1536:AiZ7CEQBUky+k9dhb59gitgHtB0D+8boZnR5zk:AipKUkyfVb59giGHtB07bCXzk
Score9/10-
Contacts a large (289781) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-