General
-
Target
3e28033a1dd0ba3934530dd900d53456.bin
-
Size
41KB
-
Sample
241223-bhcwtatkgj
-
MD5
68709285589eb4a9f64781b0341d622d
-
SHA1
c253752f6c065e5bc039fd4a8987b009b939757b
-
SHA256
816a8568462e1d49b6aad5bf2ad656b08636b9097b47eccbf1c7469d1234952a
-
SHA512
5577cafb36817b19d7c1c7d18af4f13f6728b04e18fb44fc6740bff1105fdecd14d0a169056c34ee11144f951e01dede8b762cfd72b936e8a2d1d7c40796e908
-
SSDEEP
768:k/aX0icQvDw3B1jQniNaMCjmELpJZLMbalx/OS7a4rWC93+PRL6H:kCEQvDwvsiNFCjmEt4Ed7a4rT3+PJ6H
Behavioral task
behavioral1
Sample
4293af8935a04810c1a0edf22120d6780b8fc31cb9ed0e1ba6306fdff15e03c9.elf
Resource
debian9-mipsbe-20240729-en
Malware Config
Extracted
mirai
BOTNET
Targets
-
-
Target
4293af8935a04810c1a0edf22120d6780b8fc31cb9ed0e1ba6306fdff15e03c9.elf
-
Size
91KB
-
MD5
3e28033a1dd0ba3934530dd900d53456
-
SHA1
ef4666b2655feade63925a546f2fc9e2a86269d7
-
SHA256
4293af8935a04810c1a0edf22120d6780b8fc31cb9ed0e1ba6306fdff15e03c9
-
SHA512
73c5b7ef016a91bd7bef7e051e21c580fb6831bf621530b1a24bf1a3b095127d61b6290e791835caf7ac2cf0f733c4460781b6b1040cea1558f24e0385ff0de4
-
SSDEEP
1536:w4PToD4rofjA/CFEsQ3HZW6ZWmuW5SU/WFfqLMxYkGCC0yxe3xKTRh5zCQ:wGXx/CbQ3HSqkYkGC3yJFh5zCQ
Score9/10-
Contacts a large (217916) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-