General
-
Target
7d96f7c335b32996baad95989032ddce.bin
-
Size
43KB
-
Sample
241223-bqsl8stlgq
-
MD5
6a28bf38469e41035222679bcb472d1f
-
SHA1
c885823f0dc5848513a793fe78cddab07a58fcba
-
SHA256
cae08251007eecbec2946d30f59267f8ee865772c5e14d6ec08a44805cf5c24a
-
SHA512
5b4662b0af555ef2bb7a4aa979f22ad1894486ff51f67f6b06f90e04ecd382200bb002fd4d823eb3959151226122a36ef965b49ab90c7716e72bc6eead7d0bba
-
SSDEEP
768:kfS22yemkXSnyiHmYhV5GA3UZe1ffkFJiT9GyeEmitzy9tUbNsNmGpPDh+Ing:R22ydhnyiGyV5GI1fcFJiZJyXsgPDE
Behavioral task
behavioral1
Sample
5b4ed7327c412f656765f26ac2876d8d3fe63f596c246fcf00c548aad19170e0.elf
Resource
debian12-mipsel-20240221-en
Malware Config
Extracted
mirai
BOTNET
Targets
-
-
Target
5b4ed7327c412f656765f26ac2876d8d3fe63f596c246fcf00c548aad19170e0.elf
-
Size
95KB
-
MD5
7d96f7c335b32996baad95989032ddce
-
SHA1
39a824a1d279466142b6fa40b41d424ff4b40e4c
-
SHA256
5b4ed7327c412f656765f26ac2876d8d3fe63f596c246fcf00c548aad19170e0
-
SHA512
cbff4a75fda1960e01a2d8ee2eee5034a4ce9e2b93a834dd8e692005a4829e356cf2b27c6c766880aedf58586e5bde8f78954653c285994516fc65b86ec43ec0
-
SSDEEP
1536:xoovHIiF3uyRx0He3WrvLzOPqxK/Q3Z7IBzTNvtvN2u3b/Nzg:xoovoI3tskixKI3CnX/Nzg
Score9/10-
Contacts a large (188678) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-