General
-
Target
2354f2531c0bf296738fa7733c42785f.bin
-
Size
30KB
-
Sample
241224-bgfajsxld1
-
MD5
f13930254668979e0122d89c120fcf87
-
SHA1
489b1eef7c18670e815c357572d843d6bb4a370c
-
SHA256
0dd712a06e7908f085002406fbbb8300222612d214461b6dde2dfda191572edc
-
SHA512
d93ea22b8568391b5d9aa394d36b34c9eb71eeaf8d24e03cb03fc1aba1fd26524b26f7de951e7168e1ffe41365bdd5ba19c43333adb49ebf14bf34f7184c4c65
-
SSDEEP
768:EN0mjDPN1h0ADZ7Vr3oV7TOVSXF1WH57X9Z3:EPjDPNk0ZS7K04H57tZ3
Behavioral task
behavioral1
Sample
3d0b5252c0f8736759af8b122612395ea484794afbdeb5435769f3c164d04c93.elf
Resource
ubuntu2204-amd64-20240611-en
Malware Config
Extracted
mirai
LZRD
Targets
-
-
Target
3d0b5252c0f8736759af8b122612395ea484794afbdeb5435769f3c164d04c93.elf
-
Size
64KB
-
MD5
2354f2531c0bf296738fa7733c42785f
-
SHA1
86508e4ee74c70bf226f6666bf227a12be69dcad
-
SHA256
3d0b5252c0f8736759af8b122612395ea484794afbdeb5435769f3c164d04c93
-
SHA512
eda30463d2e8355af4d6626815aedb78b1b5d43c4df53e4a9a72405074a22e9fd09f54e882b0c5ad5136202907a7e6e599d29d325d6e0b3188e6f8ff77abe679
-
SSDEEP
1536:IoRC9170vwHbQXZ5+qXDEuXi90dSW7V/DjObeFt6PuQ4Zc:PC917iwHbQXZ5+qXA594SWZ/XObeb6G7
Score9/10-
Contacts a large (20172) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Enumerates running processes
Discovers information about currently running processes on the system
-