General
-
Target
703-1-0x00400000-0x00455a28-memory.dmp
-
Size
85KB
-
Sample
241227-dpfbma1kfn
-
MD5
9fa53f2d076b07fedc31581c9bd616e3
-
SHA1
583d2c3bdae1ed585017e424a3f2b00d98c0b4f2
-
SHA256
1c53045c2a413b4ecd3f12b69081d8d4a70be47231fecff42469864fb12ec617
-
SHA512
2b513b5e956aa01569c93a6509673f5f104864bb7d00d17ca4f16248056b4d09df471ebb77d9dd812c6d1c98f1eed5b2ddb616d5434ec1d43e5076cd7a1ba0da
-
SSDEEP
1536:d9V14JYRJ4AGk15EKPd0vpi8IQL6i9U1VqihgfJRPgDrT:11hRJ4Axb0R7I69U1Vqihgfve/
Behavioral task
behavioral1
Sample
703-1-0x00400000-0x00455a28-memory.dmp
Resource
debian9-mipsbe-20240611-en
Malware Config
Extracted
mirai
LZRD
Targets
-
-
Target
703-1-0x00400000-0x00455a28-memory.dmp
-
Size
85KB
-
MD5
9fa53f2d076b07fedc31581c9bd616e3
-
SHA1
583d2c3bdae1ed585017e424a3f2b00d98c0b4f2
-
SHA256
1c53045c2a413b4ecd3f12b69081d8d4a70be47231fecff42469864fb12ec617
-
SHA512
2b513b5e956aa01569c93a6509673f5f104864bb7d00d17ca4f16248056b4d09df471ebb77d9dd812c6d1c98f1eed5b2ddb616d5434ec1d43e5076cd7a1ba0da
-
SSDEEP
1536:d9V14JYRJ4AGk15EKPd0vpi8IQL6i9U1VqihgfJRPgDrT:11hRJ4Axb0R7I69U1Vqihgfve/
Score9/10-
Contacts a large (19916) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Enumerates running processes
Discovers information about currently running processes on the system
-