General
-
Target
0d41d41efa67611f4721c465f81060f1d4c096eda88b72c0db43f104329afcb6.elf
-
Size
74KB
-
Sample
250308-dnqqza1m19
-
MD5
d0667fe1aa667917ae32b2844024eba7
-
SHA1
6a4c65c673dd99d8c291aa343beb35f345c35def
-
SHA256
0d41d41efa67611f4721c465f81060f1d4c096eda88b72c0db43f104329afcb6
-
SHA512
9ff84ed51e53c77d228cd54fab728335c2d658006667c46db1da04c70e97444d47bf5ac6f87e4e4d812430bcca3c44e3ce186d1b604443b6de10bf5367699908
-
SSDEEP
1536:LWRjo2iV+GhVYEaMl8NsRS1giSyJRNERHdXh/i:LGE2iV+GhF8NK9
Behavioral task
behavioral1
Sample
0d41d41efa67611f4721c465f81060f1d4c096eda88b72c0db43f104329afcb6.elf
Resource
debian9-mipsel-20240729-en
Malware Config
Extracted
mirai
BOTNET
Targets
-
-
Target
0d41d41efa67611f4721c465f81060f1d4c096eda88b72c0db43f104329afcb6.elf
-
Size
74KB
-
MD5
d0667fe1aa667917ae32b2844024eba7
-
SHA1
6a4c65c673dd99d8c291aa343beb35f345c35def
-
SHA256
0d41d41efa67611f4721c465f81060f1d4c096eda88b72c0db43f104329afcb6
-
SHA512
9ff84ed51e53c77d228cd54fab728335c2d658006667c46db1da04c70e97444d47bf5ac6f87e4e4d812430bcca3c44e3ce186d1b604443b6de10bf5367699908
-
SSDEEP
1536:LWRjo2iV+GhVYEaMl8NsRS1giSyJRNERHdXh/i:LGE2iV+GhF8NK9
Score9/10-
Contacts a large (181742) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Renames itself
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Enumerates running processes
Discovers information about currently running processes on the system
-
Reads process memory
Read the memory of a process through the /proc virtual filesystem. This can be used to steal credentials.
-