General
-
Target
abde533a1866fb17c76ff1edcf5facd1.bin
-
Size
60KB
-
Sample
241224-b55kcayjcy
-
MD5
da850262bdf294fbe52e9dff5252793a
-
SHA1
0cf7286efc0a4c9f54b4a81a516d26e8e1faa16d
-
SHA256
5a0c0e20848877abf758100c013918aae74f0edc7cd0879d9972b4b401fa15e7
-
SHA512
debdc7ba66a2458663a533b60a1a21fe5182b84d9455de15c3e4f5762b5c8e7d217b6c49b90dc9fc5a663f1e7057f4b65d429a11e57172e830dc1c83acfe26b6
-
SSDEEP
768:xphSZsk1rOK4lzJY0TR+0tobF4lefrWsjnFNr+FNSaNMUA0EZM7uhM470Courq6v:xpUEzTBcqeTWirraNSahk30oTu9VCtX
Behavioral task
behavioral1
Sample
ce83c30530762a5dc8832ea605a05d7c411c33d63465ce96cc37b7ef02d4223b.elf
Resource
debian12-armhf-20240221-en
Malware Config
Extracted
mirai
LZRD
Targets
-
-
Target
ce83c30530762a5dc8832ea605a05d7c411c33d63465ce96cc37b7ef02d4223b.elf
-
Size
141KB
-
MD5
abde533a1866fb17c76ff1edcf5facd1
-
SHA1
21bd062bb8d518f384ed18ca0f2cef91cffbb5f8
-
SHA256
ce83c30530762a5dc8832ea605a05d7c411c33d63465ce96cc37b7ef02d4223b
-
SHA512
d55f6adfa3dd8b543ed972d6562c8f20cbcb0772f3b7dbc125f2dab9183c92f00feee991f75d85d33add31429f077c64e0d87bda4ab4ef18f159e7e6b116dfec
-
SSDEEP
3072:walgM69pe0QmlTvIUdt9mrsplDKZUQQBKXAVanXX+F8JyvSPhLZ85iBMR6yoC1Qo:walgM69pe0QmlTvI8t9mrsplDKZUQQBt
Score9/10-
Contacts a large (20386) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Enumerates running processes
Discovers information about currently running processes on the system
-