General
-
Target
drea4.elf
-
Size
155KB
-
Sample
250307-ry7zws1yes
-
MD5
c1f2972eb772dcdfc5de05ba17fd89fe
-
SHA1
a67293add206b63c2794a489eb763fcc3f7b7528
-
SHA256
b7a8882a502098f8b51aa06b9c215be250307c4e355f6f7073819d2562f23741
-
SHA512
0bdd20297852d2dd7c6c3974eaf9539126ca40ad9068fe0ba1faf9c066f0f9968edf88e58dcfea4b485e3c5f5def62938f25525508d92aa59ae779778ba6c217
-
SSDEEP
3072:Yrar2mhqodwdRbfW4psvkBSmIW8OWfiXf1:Yr/dpfW4p0kBVIsW6XN
Behavioral task
behavioral1
Sample
drea4.elf
Resource
debian9-armhf-20240611-en
Malware Config
Extracted
mirai
BOTNET
Targets
-
-
Target
drea4.elf
-
Size
155KB
-
MD5
c1f2972eb772dcdfc5de05ba17fd89fe
-
SHA1
a67293add206b63c2794a489eb763fcc3f7b7528
-
SHA256
b7a8882a502098f8b51aa06b9c215be250307c4e355f6f7073819d2562f23741
-
SHA512
0bdd20297852d2dd7c6c3974eaf9539126ca40ad9068fe0ba1faf9c066f0f9968edf88e58dcfea4b485e3c5f5def62938f25525508d92aa59ae779778ba6c217
-
SSDEEP
3072:Yrar2mhqodwdRbfW4psvkBSmIW8OWfiXf1:Yr/dpfW4p0kBVIsW6XN
Score9/10-
Contacts a large (5122) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Deletes itself
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Writes file to system bin folder
-