General
-
Target
73b4197735fc62bb150f2be14b243a36d9e3a67c74513df82e06a95651792331.elf
-
Size
73KB
-
Sample
250307-fqwfcat1ct
-
MD5
be093382b89ca448e81b889490d55070
-
SHA1
516a3e310ccd3bba8e7d8220717f3e2721303df0
-
SHA256
73b4197735fc62bb150f2be14b243a36d9e3a67c74513df82e06a95651792331
-
SHA512
f65d7b13839c5cf6dfc24cc0df3d8d583bcda82eb79462e919ba995f39590f2d3983875c9326d81c65e60e57de7440deed6d810df6b266b80d68953ef3c71a2f
-
SSDEEP
1536:NRnZzxaSMIArEY7Zb08Pat44ZlC8Zh5vR9KWj949lZEin/6QaQI3:Rx9MaY7Zo894ZlC8Zh5vR9KWWV6Q/
Behavioral task
behavioral1
Sample
73b4197735fc62bb150f2be14b243a36d9e3a67c74513df82e06a95651792331.elf
Resource
debian12-armhf-20240221-en
Malware Config
Extracted
mirai
BOTNET
Targets
-
-
Target
73b4197735fc62bb150f2be14b243a36d9e3a67c74513df82e06a95651792331.elf
-
Size
73KB
-
MD5
be093382b89ca448e81b889490d55070
-
SHA1
516a3e310ccd3bba8e7d8220717f3e2721303df0
-
SHA256
73b4197735fc62bb150f2be14b243a36d9e3a67c74513df82e06a95651792331
-
SHA512
f65d7b13839c5cf6dfc24cc0df3d8d583bcda82eb79462e919ba995f39590f2d3983875c9326d81c65e60e57de7440deed6d810df6b266b80d68953ef3c71a2f
-
SSDEEP
1536:NRnZzxaSMIArEY7Zb08Pat44ZlC8Zh5vR9KWj949lZEin/6QaQI3:Rx9MaY7Zo894ZlC8Zh5vR9KWWV6Q/
Score9/10-
Contacts a large (166185) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Renames itself
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Enumerates running processes
Discovers information about currently running processes on the system
-