General
-
Target
0bdf628b8440886203e1f45d3682130a.bin
-
Size
42KB
-
Sample
241223-bcr4jstjgq
-
MD5
fae5bf255c8c88623e419358a7cafad7
-
SHA1
c4dbaaee10af23ca77bd29b900cb35cca1295196
-
SHA256
a4f914e2fe08f52492791bf801c36c6232f9d70ffc54fcdde3e3ec6571403655
-
SHA512
792eb7d4e2d9239f844874245d46f3d203d8e0547d0050d7f61b51c21b14bb13f60d29011f209b8ad6588db141bff7b45f9c83e4f53c304291e8b56d3cf5cebc
-
SSDEEP
768:zLQ2V83QiaNNu/GFE1fU8Pu95BUqVUlrL9RSPtpYMMCdeTf:fi3f0Nu/GFFQs5eqVGH2PngT
Behavioral task
behavioral1
Sample
252450f86c557a4eb2dfbebd6820b602b6fca68661caacc2fc4f1f3bfe50a883.elf
Resource
debian12-mipsel-20240221-en
Malware Config
Extracted
mirai
BOTNET
Targets
-
-
Target
252450f86c557a4eb2dfbebd6820b602b6fca68661caacc2fc4f1f3bfe50a883.elf
-
Size
95KB
-
MD5
0bdf628b8440886203e1f45d3682130a
-
SHA1
40186d96c2a3be219eb0915a0dd7c9802288f1bf
-
SHA256
252450f86c557a4eb2dfbebd6820b602b6fca68661caacc2fc4f1f3bfe50a883
-
SHA512
b07b6c1c677e9f4f143ea02b247864c03f25220074a99b7f66f9e616af482623e5ae6c50fa12386079f468375853d18bccd7c5d83e4a4dde12030219089f8e28
-
SSDEEP
1536:CbU6OoTiUD/LN0boB9Z4F4J62HNh9kyhqduZPIfCMj6aPAu2Sc4Azd:CbU6DTfqoU2th9jhyuppcAzd
Score9/10-
Contacts a large (189051) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-