General
-
Target
x86_64.elf
-
Size
49KB
-
Sample
250115-r6ey3svrhz
-
MD5
8009c6add42a8503ba07974025f30f7f
-
SHA1
3aa5119043c6f2bdd546d4963dc1d0ee478f2f8c
-
SHA256
04112cfea5c0f9bfcebbb0de9b42645b81de8bef4028bfd315d43b3daee49674
-
SHA512
2b2ccc906038410349d406cfde4a83153f8da6f19c33ab24c22b6e8d112a3769e72e8a49656c55489b90d06dba267ad8f59b6ec30e42dedb8075302e3b2b8162
-
SSDEEP
1536:z2Cjz+rGHUo+iwYRkawchfD1EPtAFQPfkq:Vj6iHUmwYqs1EPtjfk
Behavioral task
behavioral1
Sample
x86_64.elf
Resource
ubuntu2204-amd64-20240522.1-en
Malware Config
Extracted
mirai
BOTNET
Targets
-
-
Target
x86_64.elf
-
Size
49KB
-
MD5
8009c6add42a8503ba07974025f30f7f
-
SHA1
3aa5119043c6f2bdd546d4963dc1d0ee478f2f8c
-
SHA256
04112cfea5c0f9bfcebbb0de9b42645b81de8bef4028bfd315d43b3daee49674
-
SHA512
2b2ccc906038410349d406cfde4a83153f8da6f19c33ab24c22b6e8d112a3769e72e8a49656c55489b90d06dba267ad8f59b6ec30e42dedb8075302e3b2b8162
-
SSDEEP
1536:z2Cjz+rGHUo+iwYRkawchfD1EPtAFQPfkq:Vj6iHUmwYqs1EPtjfk
Score9/10-
Contacts a large (114141) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-