General
-
Target
9a397c973a66d7380ca64d61070b88d3.bin
-
Size
29KB
-
Sample
241224-b2hamsykcn
-
MD5
5c4feda9f22fc592b60ebc3702fc4dd3
-
SHA1
531758190d2002737cac72a79718306daf3b889f
-
SHA256
0209d4351223ba1063c5afdc5b587869eed82a483ac5d8bb47eedba8fb341db4
-
SHA512
3f3f4258bb14fbe0985497a50239829d2fdfff1f901dbc366a10d9e06877edc21ae71e91a505322d5b05e9393b7de42e8daed6d94aaa046898ef5bce5e75774b
-
SSDEEP
768:3fmBu8nMhpaGjwFo6iIEflgYqonQLkUbeZ4rwlU0:JtAGjCoKUlzqoQLNaOIU0
Behavioral task
behavioral1
Sample
67b7d4c356522d870024d4f04289dc6bcc53537209478fe43347511abb7e63fc.elf
Resource
debian12-mipsel-20240221-en
Malware Config
Extracted
mirai
LZRD
Targets
-
-
Target
67b7d4c356522d870024d4f04289dc6bcc53537209478fe43347511abb7e63fc.elf
-
Size
89KB
-
MD5
9a397c973a66d7380ca64d61070b88d3
-
SHA1
f6828d001883357d22adf948b087ca400c5498dc
-
SHA256
67b7d4c356522d870024d4f04289dc6bcc53537209478fe43347511abb7e63fc
-
SHA512
18c4d902787043acdc63b3640f6e405dc8f96be38fbd40664595b1c6224adddcfc7895a20417a0de140c8280dc117f3dc7e9bcbb9336b8f0eabfb9f44d7adb77
-
SSDEEP
1536:NYCYxrXP40ODyPwHRQ9PlzTRfyToNoZqCi:qCYxrKDy46Nr
Score9/10-
Contacts a large (12720) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Enumerates running processes
Discovers information about currently running processes on the system
-