General
-
Target
5f9077245a8bd881f4a484ede89d6e4d.bin
-
Size
42KB
-
Sample
241223-blxematjbv
-
MD5
ea0366dd5ffb79a270ae52fb4fb10fa0
-
SHA1
f11a4dca764268db1a6365df0ec0de9799830e84
-
SHA256
30fbf2a46a40e9995c5a7b445021205c80d500837da93d4a3ea79e5d09017629
-
SHA512
54dc0510f9b09bf4d392bccd9b0992c90c7128317d605b6511c00e823c5e70bfc579bed3272d5b29594ee87f6c402f5e9a698f294a6fe3e20bd8019f48110fbd
-
SSDEEP
768:pX8sEw1pHMf4rV+AmR3VQ6HSbds8Rt4WruvcQgDHBenX:pXKVO8Amf/SbdsgCcHBenX
Behavioral task
behavioral1
Sample
875ec9e70673f8049e02d6d061e6bec597dbe68ccb31cfdaad54d2c05b6d1c7b.elf
Resource
debian9-mipsbe-20240418-en
Malware Config
Extracted
mirai
BOTNET
Targets
-
-
Target
875ec9e70673f8049e02d6d061e6bec597dbe68ccb31cfdaad54d2c05b6d1c7b.elf
-
Size
95KB
-
MD5
5f9077245a8bd881f4a484ede89d6e4d
-
SHA1
ad002c54c920ba8a336e41dd6638b9ed6bc13f62
-
SHA256
875ec9e70673f8049e02d6d061e6bec597dbe68ccb31cfdaad54d2c05b6d1c7b
-
SHA512
2140fad63ffffef28c978d74a6414f776b9ecd0d199502f533f081c5d4a4666cd90f8acbc501ba626d084bc1c8ac15671487e5b855546553b9f4fedf8d465cbd
-
SSDEEP
1536:NO7ijkRfjMudJkVlFCxFCSiCJ6TPPb/0ggyTjhnnVQ6e9P0DRdz3u:HYyuIVB70KTjhnVQ8Rdz3u
Score9/10-
Contacts a large (294834) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-