General
-
Target
a11c7c184bb3c5237c9173a27d8da8b880c171939945216bc4cdabb61d0e0c9d.elf
-
Size
50KB
-
Sample
250307-gey8jawkt2
-
MD5
3c408fb97d7c344322e2390513cdaae1
-
SHA1
b2489131e0044748ee2f8c577163cc1af639137f
-
SHA256
a11c7c184bb3c5237c9173a27d8da8b880c171939945216bc4cdabb61d0e0c9d
-
SHA512
693462d4aa4eaebd8f623b3518dc8f89a0ee1add46d7fdf71f98814874d8e85116e3f5dcaceab01041d0d5f04efab2ffd0d0f3b159e2fbdc7e42ec1832406326
-
SSDEEP
768:DMnolJlR+K9COmVBjECJNJvOn3vej77ogZuh8rom/h14BGINsJSknK4Lg:uolTsYCJ3mnfe3Vuh8sm5OEfrF
Behavioral task
behavioral1
Sample
a11c7c184bb3c5237c9173a27d8da8b880c171939945216bc4cdabb61d0e0c9d.elf
Resource
debian9-armhf-20240729-en
Malware Config
Extracted
mirai
BOTNET
Targets
-
-
Target
a11c7c184bb3c5237c9173a27d8da8b880c171939945216bc4cdabb61d0e0c9d.elf
-
Size
50KB
-
MD5
3c408fb97d7c344322e2390513cdaae1
-
SHA1
b2489131e0044748ee2f8c577163cc1af639137f
-
SHA256
a11c7c184bb3c5237c9173a27d8da8b880c171939945216bc4cdabb61d0e0c9d
-
SHA512
693462d4aa4eaebd8f623b3518dc8f89a0ee1add46d7fdf71f98814874d8e85116e3f5dcaceab01041d0d5f04efab2ffd0d0f3b159e2fbdc7e42ec1832406326
-
SSDEEP
768:DMnolJlR+K9COmVBjECJNJvOn3vej77ogZuh8rom/h14BGINsJSknK4Lg:uolTsYCJ3mnfe3Vuh8sm5OEfrF
Score7/10-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Renames itself
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Enumerates running processes
Discovers information about currently running processes on the system
-