General
-
Target
c98e2a6a4e348c46febeea10a60e5f36708fb26d5af1405a97e8ba3e4b1d3257.elf
-
Size
49KB
-
Sample
250307-hxv49swqt8
-
MD5
eea027cd04972ccf570c9186dda2f572
-
SHA1
6649dbed7d534f52a93d5b72fa3bc580707710d9
-
SHA256
c98e2a6a4e348c46febeea10a60e5f36708fb26d5af1405a97e8ba3e4b1d3257
-
SHA512
0a2627b9307610ea2419ff0ddd01c93f62878b815b57381c211dae75f95bd85fad6e0ef0ee552ea4d09dc81c62aeab2e5beea6ab8d80c3e1719dc601cedb0cb2
-
SSDEEP
1536:7uld7p12jkVJCWsAmSfFkCFk9m86+H/nHqY4ec:7uldP2jkV0BSfnyH/Hqh/
Behavioral task
behavioral1
Sample
c98e2a6a4e348c46febeea10a60e5f36708fb26d5af1405a97e8ba3e4b1d3257.elf
Resource
ubuntu1804-amd64-20240611-en
Malware Config
Extracted
mirai
BOTNET
Targets
-
-
Target
c98e2a6a4e348c46febeea10a60e5f36708fb26d5af1405a97e8ba3e4b1d3257.elf
-
Size
49KB
-
MD5
eea027cd04972ccf570c9186dda2f572
-
SHA1
6649dbed7d534f52a93d5b72fa3bc580707710d9
-
SHA256
c98e2a6a4e348c46febeea10a60e5f36708fb26d5af1405a97e8ba3e4b1d3257
-
SHA512
0a2627b9307610ea2419ff0ddd01c93f62878b815b57381c211dae75f95bd85fad6e0ef0ee552ea4d09dc81c62aeab2e5beea6ab8d80c3e1719dc601cedb0cb2
-
SSDEEP
1536:7uld7p12jkVJCWsAmSfFkCFk9m86+H/nHqY4ec:7uldP2jkV0BSfnyH/Hqh/
Score9/10-
Contacts a large (66574) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Renames itself
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Enumerates running processes
Discovers information about currently running processes on the system
-