General
-
Target
ef2c1fb3021bd5fdd2a2a666dfea2129b6c40e7028a950899177c69eadf2c226.elf
-
Size
33KB
-
Sample
250202-fv4mhsypbp
-
MD5
e51e5ad5ab2f56f44eeee5c3e6383107
-
SHA1
3190ef741256308fa4f53a4f05c699207515a641
-
SHA256
ef2c1fb3021bd5fdd2a2a666dfea2129b6c40e7028a950899177c69eadf2c226
-
SHA512
a5c2ced3712937db0d7ac0779ca33017ac7f5e9fcd5f6f23c9f4ad7042409a95c7a6b32c51ea47b668d305428f66eed3717b7639e800ef074e2bcb999906b785
-
SSDEEP
768:Tjha+4zu8iCkF3zA1NwZMj+nWZZAxPUmLii:TjhaBaXMHg0+nWZZiMmLii
Behavioral task
behavioral1
Sample
ef2c1fb3021bd5fdd2a2a666dfea2129b6c40e7028a950899177c69eadf2c226.elf
Resource
ubuntu2204-amd64-20240729-en
Malware Config
Extracted
mirai
BOTNET
Targets
-
-
Target
ef2c1fb3021bd5fdd2a2a666dfea2129b6c40e7028a950899177c69eadf2c226.elf
-
Size
33KB
-
MD5
e51e5ad5ab2f56f44eeee5c3e6383107
-
SHA1
3190ef741256308fa4f53a4f05c699207515a641
-
SHA256
ef2c1fb3021bd5fdd2a2a666dfea2129b6c40e7028a950899177c69eadf2c226
-
SHA512
a5c2ced3712937db0d7ac0779ca33017ac7f5e9fcd5f6f23c9f4ad7042409a95c7a6b32c51ea47b668d305428f66eed3717b7639e800ef074e2bcb999906b785
-
SSDEEP
768:Tjha+4zu8iCkF3zA1NwZMj+nWZZAxPUmLii:TjhaBaXMHg0+nWZZiMmLii
Score9/10-
Contacts a large (6708) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Deletes itself
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Renames itself
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Enumerates running processes
Discovers information about currently running processes on the system
-