General
-
Target
6ed9f8d984d41fe016a1a4b025c20758.bin
-
Size
42KB
-
Sample
241222-bqr1psxmdx
-
MD5
9b430899d1c93af4ae3fabcda1164619
-
SHA1
08f26d199d8e7029244b6e258bba0b437d6dd28c
-
SHA256
aa44e11a2f0b5dc34b94f5c86a6eb0268ec95a8172946ea80d75e21f40bcc9ce
-
SHA512
486a478ff7d29465cc4b38d914b21bef0a422fc617535244562cb0531d4ab3e7b4e72f19196786a5bf6a30ef32f9331aa39d93e92522baea06dcccdcede35ca3
-
SSDEEP
768:0oAIyVlDyMDi9NJQUCk4L7EzAfWW3URkfvG8h2IrnyX9DKnUdNAjx:HAIyVtyMorQU/4LkYWW3URkHG8bbyX9k
Behavioral task
behavioral1
Sample
5fef13fcea7bef065948a581550deb4b54f36dd72d0d9385b1012f991e5b04c6.elf
Resource
debian9-armhf-20240611-en
Malware Config
Extracted
mirai
BOTNET
Targets
-
-
Target
5fef13fcea7bef065948a581550deb4b54f36dd72d0d9385b1012f991e5b04c6.elf
-
Size
75KB
-
MD5
6ed9f8d984d41fe016a1a4b025c20758
-
SHA1
da4047ab5cecd85cd22660077c304ea261489369
-
SHA256
5fef13fcea7bef065948a581550deb4b54f36dd72d0d9385b1012f991e5b04c6
-
SHA512
ab261ed19eb20a3e9705a135d9590c484b884e82877e803a4f4c6d6797b3d6e5d7f4356aa69d756cc096d4b013c0a5ff410223a3f9eeac7f7ab6e997a7190462
-
SSDEEP
1536:gxOvt3uPfoZ9mHmk9Vpk9dRH5L39tS/8FEQPQgu+5jmsS9vPzk:gxcJuPfQjkHOdH5L39U/8FEQ5ZaPzk
Score9/10-
Contacts a large (285455) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Enumerates running processes
Discovers information about currently running processes on the system
-