General
-
Target
c9e2cf5f4e9f34ec1bb8a14d4aa57d2336cc72b7c0efa86de9bc417a6050ecae.elf
-
Size
48KB
-
Sample
250202-fmk57swrbw
-
MD5
0b58310f356d2589747136f3ef14e653
-
SHA1
084ae0f0a86a8fdfbb5af25b7efd119204c57a4c
-
SHA256
c9e2cf5f4e9f34ec1bb8a14d4aa57d2336cc72b7c0efa86de9bc417a6050ecae
-
SHA512
d98679bdb359dbeb56cdb32c56d42b14f1f7bf9361b8fe5663d66c54470c9632fcfdc4567a829c40597ce41e7d82222650be0df7dcb585c8740385ac39adc38b
-
SSDEEP
1536:aH3oG7jBo2VZXuP58wCw0JRoxabmbe1sz4xab:aH40jBo2ru58FtJtbmbeyzW8
Behavioral task
behavioral1
Sample
c9e2cf5f4e9f34ec1bb8a14d4aa57d2336cc72b7c0efa86de9bc417a6050ecae.elf
Resource
ubuntu2204-amd64-20240729-en
Malware Config
Extracted
mirai
BOTNET
Targets
-
-
Target
c9e2cf5f4e9f34ec1bb8a14d4aa57d2336cc72b7c0efa86de9bc417a6050ecae.elf
-
Size
48KB
-
MD5
0b58310f356d2589747136f3ef14e653
-
SHA1
084ae0f0a86a8fdfbb5af25b7efd119204c57a4c
-
SHA256
c9e2cf5f4e9f34ec1bb8a14d4aa57d2336cc72b7c0efa86de9bc417a6050ecae
-
SHA512
d98679bdb359dbeb56cdb32c56d42b14f1f7bf9361b8fe5663d66c54470c9632fcfdc4567a829c40597ce41e7d82222650be0df7dcb585c8740385ac39adc38b
-
SSDEEP
1536:aH3oG7jBo2VZXuP58wCw0JRoxabmbe1sz4xab:aH40jBo2ru58FtJtbmbeyzW8
Score9/10-
Contacts a large (44385) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Deletes itself
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Renames itself
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Enumerates running processes
Discovers information about currently running processes on the system
-