General
-
Target
boatnet.x86.elf
-
Size
28KB
-
Sample
241231-trclhs1kcr
-
MD5
d883fbf5856d51767d033f7a51df106d
-
SHA1
dfd26e510975ffeef2784bc3ffa334e540265ac6
-
SHA256
2bdad82fa62e7cc78adaa3d2815d2eeaa6a81bf711fa4e460c4497e6cc012151
-
SHA512
bd93f1cd5458675b2379bab753e2159d05c4f7a9c549900bdd5138feb91402369fd0a84e88881fd40317806757e6672e676cc9a08e4a107fc4936933df54e782
-
SSDEEP
768:4g6P40RUPgc2RPaz4krPszNIQtBiaWLlJoO3:4gYoPx2RPaEgKHq5/
Behavioral task
behavioral1
Sample
boatnet.x86.elf
Resource
ubuntu2204-amd64-20240611-en
Malware Config
Extracted
mirai
LZRD
Targets
-
-
Target
boatnet.x86.elf
-
Size
28KB
-
MD5
d883fbf5856d51767d033f7a51df106d
-
SHA1
dfd26e510975ffeef2784bc3ffa334e540265ac6
-
SHA256
2bdad82fa62e7cc78adaa3d2815d2eeaa6a81bf711fa4e460c4497e6cc012151
-
SHA512
bd93f1cd5458675b2379bab753e2159d05c4f7a9c549900bdd5138feb91402369fd0a84e88881fd40317806757e6672e676cc9a08e4a107fc4936933df54e782
-
SSDEEP
768:4g6P40RUPgc2RPaz4krPszNIQtBiaWLlJoO3:4gYoPx2RPaEgKHq5/
Score10/10-
Mirai family
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Enumerates running processes
Discovers information about currently running processes on the system
-
Writes file to system bin folder
-