General
-
Target
84450bcfa08e7c33b1ea94302457a478b394ef0996f626ee5f1c60ab83024756.elf
-
Size
77KB
-
Sample
250202-e7sv4swjdx
-
MD5
45a33a3f566fe9a6ee1e492d1905634d
-
SHA1
2839588f169759f13e9377f05128d862e7c00f6f
-
SHA256
84450bcfa08e7c33b1ea94302457a478b394ef0996f626ee5f1c60ab83024756
-
SHA512
501a80cf158c3d87cfa1e86c0730dc09f31e206f84ea9d7d1468b2fc08e9366c7e6d1609d6035d64c08842fb480403dd445d68de6e36061625d6780e17d83505
-
SSDEEP
1536:Zxn7gLqXIQHj0jLwdeEyQqF1G4/BSc9Zg9ZUzMVy9r2UQZdljuit+AG2:kLgIZjLqeECl/BSyIWzMVy9r2Nd+AB
Behavioral task
behavioral1
Sample
84450bcfa08e7c33b1ea94302457a478b394ef0996f626ee5f1c60ab83024756.elf
Resource
debian9-armhf-20240611-en
Malware Config
Extracted
mirai
BOTNET
Targets
-
-
Target
84450bcfa08e7c33b1ea94302457a478b394ef0996f626ee5f1c60ab83024756.elf
-
Size
77KB
-
MD5
45a33a3f566fe9a6ee1e492d1905634d
-
SHA1
2839588f169759f13e9377f05128d862e7c00f6f
-
SHA256
84450bcfa08e7c33b1ea94302457a478b394ef0996f626ee5f1c60ab83024756
-
SHA512
501a80cf158c3d87cfa1e86c0730dc09f31e206f84ea9d7d1468b2fc08e9366c7e6d1609d6035d64c08842fb480403dd445d68de6e36061625d6780e17d83505
-
SSDEEP
1536:Zxn7gLqXIQHj0jLwdeEyQqF1G4/BSc9Zg9ZUzMVy9r2UQZdljuit+AG2:kLgIZjLqeECl/BSyIWzMVy9r2Nd+AB
Score9/10-
Contacts a large (109443) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Deletes itself
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Renames itself
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Enumerates running processes
Discovers information about currently running processes on the system
-
Reads process memory
Read the memory of a process through the /proc virtual filesystem. This can be used to steal credentials.
-