General
-
Target
65797db0f0c80761c8f733de64d0f44431ecf18af76702319b84b34dd9111c99.elf
-
Size
70KB
-
Sample
250202-e1nyksvqay
-
MD5
fb5e5245688736e9d13c832465292e6a
-
SHA1
e31e6863abf4610186c14e5bb868152ed902ffeb
-
SHA256
65797db0f0c80761c8f733de64d0f44431ecf18af76702319b84b34dd9111c99
-
SHA512
134df4aebe6543768eb0c6034fc66840bf41d858bb97f5ae3c41898ced3b51252e1e3d2544f79b59652f3df7c0838a27475d02057bb3af710ca283af4d2a6e29
-
SSDEEP
1536:xvfwnX7GltwnKn4Qp9WF7h9ibxU5jZ6i0nyAcx:tInX78twufXu5ci+yTx
Behavioral task
behavioral1
Sample
65797db0f0c80761c8f733de64d0f44431ecf18af76702319b84b34dd9111c99.elf
Resource
debian9-mipsbe-20240611-en
Malware Config
Extracted
mirai
BOTNET
Targets
-
-
Target
65797db0f0c80761c8f733de64d0f44431ecf18af76702319b84b34dd9111c99.elf
-
Size
70KB
-
MD5
fb5e5245688736e9d13c832465292e6a
-
SHA1
e31e6863abf4610186c14e5bb868152ed902ffeb
-
SHA256
65797db0f0c80761c8f733de64d0f44431ecf18af76702319b84b34dd9111c99
-
SHA512
134df4aebe6543768eb0c6034fc66840bf41d858bb97f5ae3c41898ced3b51252e1e3d2544f79b59652f3df7c0838a27475d02057bb3af710ca283af4d2a6e29
-
SSDEEP
1536:xvfwnX7GltwnKn4Qp9WF7h9ibxU5jZ6i0nyAcx:tInX78twufXu5ci+yTx
Score9/10-
Contacts a large (44391) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Deletes itself
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Renames itself
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Enumerates running processes
Discovers information about currently running processes on the system
-
Reads process memory
Read the memory of a process through the /proc virtual filesystem. This can be used to steal credentials.
-