General
-
Target
5e13e2c8b444b159d7a435bfa54c5c9e1db98367d8e33e48638a642e0aca93f0.elf
-
Size
66KB
-
Sample
250202-ezbxmavpdx
-
MD5
039223d2b7b6cccba603bb55ff1db3b9
-
SHA1
cd1984a0e2539416f0ae5e774c1b3fb2ab6b9421
-
SHA256
5e13e2c8b444b159d7a435bfa54c5c9e1db98367d8e33e48638a642e0aca93f0
-
SHA512
e0a7e833dcafa9adc72dc67e5951e87a6c953c5e32b9b0a118ce72338b5940d62ebcb166353300c9b2554b4584c1495419daba729f4f0e773be7648f13c3caaf
-
SSDEEP
768:P79+h7Kfbq19azhX6NpQsq/bxy2MB5/Qn5V5eIXezbevQYGzgi9XXirqwJklqIO:P794Kzq19uhwik2yonl9XibOQYGZ8kB
Behavioral task
behavioral1
Sample
5e13e2c8b444b159d7a435bfa54c5c9e1db98367d8e33e48638a642e0aca93f0.elf
Resource
debian12-mipsel-20240221-en
Malware Config
Targets
-
-
Target
5e13e2c8b444b159d7a435bfa54c5c9e1db98367d8e33e48638a642e0aca93f0.elf
-
Size
66KB
-
MD5
039223d2b7b6cccba603bb55ff1db3b9
-
SHA1
cd1984a0e2539416f0ae5e774c1b3fb2ab6b9421
-
SHA256
5e13e2c8b444b159d7a435bfa54c5c9e1db98367d8e33e48638a642e0aca93f0
-
SHA512
e0a7e833dcafa9adc72dc67e5951e87a6c953c5e32b9b0a118ce72338b5940d62ebcb166353300c9b2554b4584c1495419daba729f4f0e773be7648f13c3caaf
-
SSDEEP
768:P79+h7Kfbq19azhX6NpQsq/bxy2MB5/Qn5V5eIXezbevQYGzgi9XXirqwJklqIO:P794Kzq19uhwik2yonl9XibOQYGZ8kB
Score9/10-
Contacts a large (103450) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Deletes itself
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Renames itself
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-