General
-
Target
9c8fa144a9688475d367bf19f455fa2efcede7219a41cf77484cabe788e17fe9.elf
-
Size
74KB
-
Sample
250308-nz4gbawxb1
-
MD5
531a60e53317c7bf134e5c6e57fc4939
-
SHA1
6069b3cb94084ec8bfad12f20a7fc992835e329d
-
SHA256
9c8fa144a9688475d367bf19f455fa2efcede7219a41cf77484cabe788e17fe9
-
SHA512
f19ca0527fb858aff4da9f864f1fad8433cc229b8ffabec4fd559a3af4a3fe3d71213a913067a6fea4314b75881ebbe5a8d24408cd8199a3ed54b15725c7505e
-
SSDEEP
1536:lKBKC1576Ph/OUbdaQZdXdXmtlvfPKt6hO0r/:0Ic57yh/pPUvPZhOA/
Behavioral task
behavioral1
Sample
9c8fa144a9688475d367bf19f455fa2efcede7219a41cf77484cabe788e17fe9.elf
Resource
debian9-mipsbe-20240611-en
Malware Config
Extracted
mirai
BOTNET
Targets
-
-
Target
9c8fa144a9688475d367bf19f455fa2efcede7219a41cf77484cabe788e17fe9.elf
-
Size
74KB
-
MD5
531a60e53317c7bf134e5c6e57fc4939
-
SHA1
6069b3cb94084ec8bfad12f20a7fc992835e329d
-
SHA256
9c8fa144a9688475d367bf19f455fa2efcede7219a41cf77484cabe788e17fe9
-
SHA512
f19ca0527fb858aff4da9f864f1fad8433cc229b8ffabec4fd559a3af4a3fe3d71213a913067a6fea4314b75881ebbe5a8d24408cd8199a3ed54b15725c7505e
-
SSDEEP
1536:lKBKC1576Ph/OUbdaQZdXdXmtlvfPKt6hO0r/:0Ic57yh/pPUvPZhOA/
Score9/10-
Contacts a large (143276) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Renames itself
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Enumerates running processes
Discovers information about currently running processes on the system
-
Reads process memory
Read the memory of a process through the /proc virtual filesystem. This can be used to steal credentials.
-