General
-
Target
0a4d9003c2abdf4225ec81e7dcd140666972aaebe9801bd9e6dc37ffc82045d6.elf
-
Size
51KB
-
Sample
250107-cgyybs1lbk
-
MD5
af952190f612aef553c2bf7830eadf6f
-
SHA1
1c64c4a9152b5b2a28e4cb8c626a3dfedae54c95
-
SHA256
0a4d9003c2abdf4225ec81e7dcd140666972aaebe9801bd9e6dc37ffc82045d6
-
SHA512
789cf3de758e43abdb13ac3e99f15f8f611a1e18f3f9053cf59fd832ce3ef1f670f94588b567c3ecc4c710872cd2c84c570f866f2d9b32c77203087ec86175be
-
SSDEEP
768:ezNRLj5lHjz5NSexhgG8JH885RwgBYoCaUsoN/lZkHP+z/GWrHWhO/NPuBTR6Ldd:aRHXfDuG8nbwgB0hplZkvOh/QBTkc4
Behavioral task
behavioral1
Sample
0a4d9003c2abdf4225ec81e7dcd140666972aaebe9801bd9e6dc37ffc82045d6.elf
Resource
debian9-armhf-20240611-en
Malware Config
Extracted
mirai
BOTNET
Targets
-
-
Target
0a4d9003c2abdf4225ec81e7dcd140666972aaebe9801bd9e6dc37ffc82045d6.elf
-
Size
51KB
-
MD5
af952190f612aef553c2bf7830eadf6f
-
SHA1
1c64c4a9152b5b2a28e4cb8c626a3dfedae54c95
-
SHA256
0a4d9003c2abdf4225ec81e7dcd140666972aaebe9801bd9e6dc37ffc82045d6
-
SHA512
789cf3de758e43abdb13ac3e99f15f8f611a1e18f3f9053cf59fd832ce3ef1f670f94588b567c3ecc4c710872cd2c84c570f866f2d9b32c77203087ec86175be
-
SSDEEP
768:ezNRLj5lHjz5NSexhgG8JH885RwgBYoCaUsoN/lZkHP+z/GWrHWhO/NPuBTR6Ldd:aRHXfDuG8nbwgB0hplZkvOh/QBTkc4
Score9/10-
Contacts a large (103889) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-