General
-
Target
1c247c4e9f82b2fac23de074011d724d.bin
-
Size
34KB
-
Sample
241226-bgnxpatkel
-
MD5
01cbeb5724cdc3fac4b088b213e34946
-
SHA1
28586e121f04bbf4dd8cd5d561d12e80826a3950
-
SHA256
a1fc073e9cd447ef16a9a3164d38eb96df1b0d1a9b0e98903574bf737fc28654
-
SHA512
182444b5d0f2a944cdbeaec8e94c0dc839f6838502620681c1057e4f5edf5e9797f3b76c0815cc9a49e55f858601b6455f8a272cd141d73223168eff38e8d687
-
SSDEEP
768:MblZ1aFwPfuHmbk8eGM8oYxs/iHlexL7b8sGvwHGfHKJ:M3K8FI/Xgxsq4d74YoKJ
Behavioral task
behavioral1
Sample
2e6870fb45436c54e458c56af1340d96ad8f61c3226b4de21e7cce3901577195.elf
Resource
debian12-mipsel-20240221-en
Malware Config
Extracted
mirai
LZRD
Targets
-
-
Target
2e6870fb45436c54e458c56af1340d96ad8f61c3226b4de21e7cce3901577195.elf
-
Size
103KB
-
MD5
1c247c4e9f82b2fac23de074011d724d
-
SHA1
33a5a38f60e72e4d666c582faae62b2342fac926
-
SHA256
2e6870fb45436c54e458c56af1340d96ad8f61c3226b4de21e7cce3901577195
-
SHA512
60f77a16f2b24133ec2d1ae7ee0b0b09061d0c45222591c0fd2c282a1b3f12c3c3f40aa5edee8124a755ca8a35951a989b165a6625797caccab1e3e9198b70db
-
SSDEEP
1536:d7fjpr4NEQu3p0ZwIGH5PbpTBRRtBeiZebzELY+iYp:d7fjpr53pndeis9F2
Score9/10-
Contacts a large (19744) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Enumerates running processes
Discovers information about currently running processes on the system
-