General
-
Target
nshkmpsl.elf
-
Size
95KB
-
Sample
241221-qphg7szrek
-
MD5
0bdf628b8440886203e1f45d3682130a
-
SHA1
40186d96c2a3be219eb0915a0dd7c9802288f1bf
-
SHA256
252450f86c557a4eb2dfbebd6820b602b6fca68661caacc2fc4f1f3bfe50a883
-
SHA512
b07b6c1c677e9f4f143ea02b247864c03f25220074a99b7f66f9e616af482623e5ae6c50fa12386079f468375853d18bccd7c5d83e4a4dde12030219089f8e28
-
SSDEEP
1536:CbU6OoTiUD/LN0boB9Z4F4J62HNh9kyhqduZPIfCMj6aPAu2Sc4Azd:CbU6DTfqoU2th9jhyuppcAzd
Behavioral task
behavioral1
Sample
nshkmpsl.elf
Resource
debian9-mipsel-20240611-en
Malware Config
Extracted
mirai
BOTNET
Targets
-
-
Target
nshkmpsl.elf
-
Size
95KB
-
MD5
0bdf628b8440886203e1f45d3682130a
-
SHA1
40186d96c2a3be219eb0915a0dd7c9802288f1bf
-
SHA256
252450f86c557a4eb2dfbebd6820b602b6fca68661caacc2fc4f1f3bfe50a883
-
SHA512
b07b6c1c677e9f4f143ea02b247864c03f25220074a99b7f66f9e616af482623e5ae6c50fa12386079f468375853d18bccd7c5d83e4a4dde12030219089f8e28
-
SSDEEP
1536:CbU6OoTiUD/LN0boB9Z4F4J62HNh9kyhqduZPIfCMj6aPAu2Sc4Azd:CbU6DTfqoU2th9jhyuppcAzd
Score9/10-
Contacts a large (235312) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-