General
-
Target
0a3f744a63b91c115ebea2513a1675c1.bin
-
Size
42KB
-
Sample
241222-bc36taxjgr
-
MD5
05378e74a61085838ee228036d683d1b
-
SHA1
39eae101426d1b4a67c57b20bcdd1990e3c68b54
-
SHA256
60847c281b5648c9f2e45d26aeec0762b4561b3c44ec9f36032669e25307a81c
-
SHA512
fba246cdaa2c7821fb3d0ac4e3c9f1609355d26de1ecd99bc64ada0851377fd01ef843e26ae805135fc281eb5804f3315ef3e41e215f82c657da2fb51c490606
-
SSDEEP
768:pL/xBoq/xRFIUEoZBsN3HOMBUt7zCX1hnvjeKh2ydy+GdpNeScHeDt1mpTB:pL5Boq/x/pEEKuMBS8hnv/7RWp2H02v
Behavioral task
behavioral1
Sample
5474721581708c747a2495a64b8888b5b0b8c609d12b4fc5886b5a00c3ea428f.elf
Resource
debian9-mipsbe-20240729-en
Malware Config
Extracted
mirai
BOTNET
Targets
-
-
Target
5474721581708c747a2495a64b8888b5b0b8c609d12b4fc5886b5a00c3ea428f.elf
-
Size
95KB
-
MD5
0a3f744a63b91c115ebea2513a1675c1
-
SHA1
ff4713c542fc3a2eadfa9aaed42353008d5cb489
-
SHA256
5474721581708c747a2495a64b8888b5b0b8c609d12b4fc5886b5a00c3ea428f
-
SHA512
86966e587d6fe3cded1885a60d1f0c6bc6ac5ece858889075fcc2c289a3d0185d4b3b374fa8342d7284fac334d7a3c4bf2b30a37c1a89d538489a2fa93f34390
-
SSDEEP
1536:tOD6zMqfjMufvF0sNFNi5NiCyiZKQ+f8Waf0ogCDhJvvNYelH7L5Rz3m:HgbufvbN5zq0SDhJ3NB5Rz3m
Score9/10-
Contacts a large (285276) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-