General
-
Target
270336c1d58b1ffaa8ebba18d47d73c2451fa149194f37cc44e980ac96cf1443.elf
-
Size
55KB
-
Sample
250307-d2alxaszgx
-
MD5
6808c976ae3e0456efb6e6fc4e1a8423
-
SHA1
d9b7a61a16aa0e2875b04ff7eac22e72fc15a24e
-
SHA256
270336c1d58b1ffaa8ebba18d47d73c2451fa149194f37cc44e980ac96cf1443
-
SHA512
8b890a0f2d216b8041577412b2d7d4f9524caf0d185f45d48ce7df781fce05e0148e3f767dfc6bb76931a9237e6a26b80decae63a7685760727a8b9716855917
-
SSDEEP
1536:llSu/lC0mny49rgfcya5F+tt5zTM4cPVSh:llSuEUraCtbvfcPVg
Behavioral task
behavioral1
Sample
270336c1d58b1ffaa8ebba18d47d73c2451fa149194f37cc44e980ac96cf1443.elf
Resource
debian9-armhf-20240611-en
Malware Config
Extracted
mirai
BOTNET
Targets
-
-
Target
270336c1d58b1ffaa8ebba18d47d73c2451fa149194f37cc44e980ac96cf1443.elf
-
Size
55KB
-
MD5
6808c976ae3e0456efb6e6fc4e1a8423
-
SHA1
d9b7a61a16aa0e2875b04ff7eac22e72fc15a24e
-
SHA256
270336c1d58b1ffaa8ebba18d47d73c2451fa149194f37cc44e980ac96cf1443
-
SHA512
8b890a0f2d216b8041577412b2d7d4f9524caf0d185f45d48ce7df781fce05e0148e3f767dfc6bb76931a9237e6a26b80decae63a7685760727a8b9716855917
-
SSDEEP
1536:llSu/lC0mny49rgfcya5F+tt5zTM4cPVSh:llSuEUraCtbvfcPVg
Score9/10-
Contacts a large (162424) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Renames itself
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Enumerates running processes
Discovers information about currently running processes on the system
-
Reads process memory
Read the memory of a process through the /proc virtual filesystem. This can be used to steal credentials.
-