General
-
Target
df328e1ec2ef2844f67426ad0dcea1b844de261cee24a94a83365cdccb89cb8d.elf
-
Size
34KB
-
Sample
250307-jkt7waxks9
-
MD5
e78b38a38e9d29e65c62d69fab9c21d6
-
SHA1
24e806a34d68ded244ed6a126788d628bafea484
-
SHA256
df328e1ec2ef2844f67426ad0dcea1b844de261cee24a94a83365cdccb89cb8d
-
SHA512
2f3813b83f1c91dc134469aabaf977e2eb263fb2d1024d61838a96fc54d0e65998d44035b8d266b6d83e6e7a9555c60fa9533c756155a83d656aef6b1443dd2b
-
SSDEEP
768:3K+WG4fB+Huvbh7W3SC1UhFquNbfkopyP:3KC4BlsUCuFsopY
Behavioral task
behavioral1
Sample
df328e1ec2ef2844f67426ad0dcea1b844de261cee24a94a83365cdccb89cb8d.elf
Resource
ubuntu1804-amd64-20240729-en
Malware Config
Extracted
mirai
BOTNET
Targets
-
-
Target
df328e1ec2ef2844f67426ad0dcea1b844de261cee24a94a83365cdccb89cb8d.elf
-
Size
34KB
-
MD5
e78b38a38e9d29e65c62d69fab9c21d6
-
SHA1
24e806a34d68ded244ed6a126788d628bafea484
-
SHA256
df328e1ec2ef2844f67426ad0dcea1b844de261cee24a94a83365cdccb89cb8d
-
SHA512
2f3813b83f1c91dc134469aabaf977e2eb263fb2d1024d61838a96fc54d0e65998d44035b8d266b6d83e6e7a9555c60fa9533c756155a83d656aef6b1443dd2b
-
SSDEEP
768:3K+WG4fB+Huvbh7W3SC1UhFquNbfkopyP:3KC4BlsUCuFsopY
Score9/10-
Contacts a large (14701) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Renames itself
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Enumerates running processes
Discovers information about currently running processes on the system
-