General
-
Target
x86
-
Size
45KB
-
Sample
250129-taq3ks1kbj
-
MD5
2fecd2ea233a6a25108b24507ed42d92
-
SHA1
13a4bbad492664537a17eaca0ce8e1438ea61e73
-
SHA256
76be449e67d2c68c75ff0312a50904140cde0a479968f0fe32192bb9a7e76782
-
SHA512
5440d9f5393fa279c09683bb8d605322398427e915a863703e8768995b2827bb219591005b0ed8bdc6a8cdeca1d027a800bf4d341f9d59428b6a0c9e6e3392d6
-
SSDEEP
768:xk/LjSNwrGBs80WEe9lyXR2k4kHgMVfM1gY4/UGZXTfOEmo3kP:xk/LjSNwrGBzFEZpgHt4JZXTfObo3k
Behavioral task
behavioral1
Sample
x86
Resource
ubuntu2004-amd64-20240611-en
Malware Config
Extracted
mirai
BOTNET
elitexrebirth.elite-api.su
Targets
-
-
Target
x86
-
Size
45KB
-
MD5
2fecd2ea233a6a25108b24507ed42d92
-
SHA1
13a4bbad492664537a17eaca0ce8e1438ea61e73
-
SHA256
76be449e67d2c68c75ff0312a50904140cde0a479968f0fe32192bb9a7e76782
-
SHA512
5440d9f5393fa279c09683bb8d605322398427e915a863703e8768995b2827bb219591005b0ed8bdc6a8cdeca1d027a800bf4d341f9d59428b6a0c9e6e3392d6
-
SSDEEP
768:xk/LjSNwrGBs80WEe9lyXR2k4kHgMVfM1gY4/UGZXTfOEmo3kP:xk/LjSNwrGBzFEZpgHt4JZXTfObo3k
Score9/10-
Contacts a large (40110) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Enumerates running processes
Discovers information about currently running processes on the system
-