General
-
Target
1a4375f6423f0c96f3d2377d1c157595.bin
-
Size
51KB
-
Sample
241223-bdbg7atkal
-
MD5
47ab0b12a2c67cc288f0447ef32a51c2
-
SHA1
eb3affdc02d1c624a3b1f43006f12a79b098e467
-
SHA256
589dde3c587d720d5762edec729306329acd5ce8c9abfa5464c8834febdde357
-
SHA512
9ef27843cf8886004e8a2897043ac35639023e07e1f0a9a660ba61c2eaf7f0a0988ce618e678fc3662236b8bf22e4e734e232a8d94e74ae417367d5e2126bba2
-
SSDEEP
768:Pm824+zg/nx7a38kgpTWH7Twf9kBl4+oP8UiVhSWSPNxw6zkzELi05ql1Ww6Q:Pm+RZ23gU70fulgP8Hozz5M1zP
Behavioral task
behavioral1
Sample
4d315e63c562b354627d6b169e197d5cf108f318b446dac59c8edff283314e9d.elf
Resource
debian9-armhf-20240611-en
Malware Config
Extracted
mirai
BOTNET
Targets
-
-
Target
4d315e63c562b354627d6b169e197d5cf108f318b446dac59c8edff283314e9d.elf
-
Size
97KB
-
MD5
1a4375f6423f0c96f3d2377d1c157595
-
SHA1
fec7b3bd66d1d4a88b7a22511962007f7b99e34b
-
SHA256
4d315e63c562b354627d6b169e197d5cf108f318b446dac59c8edff283314e9d
-
SHA512
fca72e6629a9e1440df86bb7c46592f6f0294aafdfd4839f461862dcbafcc3cc534d71061f3e43d870655fb56d5417258074e0994e568c7b044a41fb87ba8be2
-
SSDEEP
3072:GKsAW3h8xjDI0taCqGwapyAuKltAJzL7azhHH:GKSRPsaCqGwapPu8AhLIHH
Score10/10-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Redline family
-
Contacts a large (248573) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-