General
-
Target
botx.x86.elf
-
Size
50KB
-
Sample
241230-ep773sxpaw
-
MD5
1092f7846a6ca7a5e92ece0ea93ff82e
-
SHA1
140fd3e84c49d382e6b0f9a40730d1cd465f8347
-
SHA256
a5ddb64df4b96bfeae6860981f98b4845df83db34ffaf238548bede6067f15c2
-
SHA512
11ba6cdfba1784d5f2895f351def8d6a4dc0d5efd56b735978d1ff7416d2a52da07931250f37311362c8d522f7db89e3ac8bf1de890302afa6281ce2a2f6b2ba
-
SSDEEP
768:ytYRSjaQ9DaZ/oJlExakbMqu8iz/nkvKy+hFlKTm/4RsvKQLDJCgMjz:WYRSjaCu1wlPbPly+hnKq/4G3LNCgMv
Behavioral task
behavioral1
Sample
botx.x86.elf
Resource
ubuntu2204-amd64-20240522.1-en
Malware Config
Extracted
mirai
CONDI
botnet.tfmobile.store
report.tfmobile.store
Targets
-
-
Target
botx.x86.elf
-
Size
50KB
-
MD5
1092f7846a6ca7a5e92ece0ea93ff82e
-
SHA1
140fd3e84c49d382e6b0f9a40730d1cd465f8347
-
SHA256
a5ddb64df4b96bfeae6860981f98b4845df83db34ffaf238548bede6067f15c2
-
SHA512
11ba6cdfba1784d5f2895f351def8d6a4dc0d5efd56b735978d1ff7416d2a52da07931250f37311362c8d522f7db89e3ac8bf1de890302afa6281ce2a2f6b2ba
-
SSDEEP
768:ytYRSjaQ9DaZ/oJlExakbMqu8iz/nkvKy+hFlKTm/4RsvKQLDJCgMjz:WYRSjaCu1wlPbPly+hnKq/4G3LNCgMv
Score9/10-
Contacts a large (56036) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Writes file to system bin folder
-