General
-
Target
a7b04de90cab3b5aaa1f510aa9f2895f7b9fe9d12f7e07d6bf470ddff13f3cdc.elf
-
Size
74KB
-
Sample
250308-pnxp3axjz3
-
MD5
c2a9f283ca96c3782ba52fcfb9b96d7c
-
SHA1
fee2094b5ba28019c0a737b429360a138a5e663e
-
SHA256
a7b04de90cab3b5aaa1f510aa9f2895f7b9fe9d12f7e07d6bf470ddff13f3cdc
-
SHA512
2d7abb34e95d07f41b0ec6d563e015b7110bd3a78aac6d248cac75a38b9f3ec3b147b74d80e0fb453f8067b4fd2d2139feb49b8f0317839c0d97118cd7da10f4
-
SSDEEP
1536:LWRjo2iV+GhVYEaMltNsRS1giSyJRNERHdXh/e:LGE2iV+GhFtNK9
Behavioral task
behavioral1
Sample
a7b04de90cab3b5aaa1f510aa9f2895f7b9fe9d12f7e07d6bf470ddff13f3cdc.elf
Resource
debian9-mipsel-20240226-en
Malware Config
Extracted
mirai
BOTNET
Targets
-
-
Target
a7b04de90cab3b5aaa1f510aa9f2895f7b9fe9d12f7e07d6bf470ddff13f3cdc.elf
-
Size
74KB
-
MD5
c2a9f283ca96c3782ba52fcfb9b96d7c
-
SHA1
fee2094b5ba28019c0a737b429360a138a5e663e
-
SHA256
a7b04de90cab3b5aaa1f510aa9f2895f7b9fe9d12f7e07d6bf470ddff13f3cdc
-
SHA512
2d7abb34e95d07f41b0ec6d563e015b7110bd3a78aac6d248cac75a38b9f3ec3b147b74d80e0fb453f8067b4fd2d2139feb49b8f0317839c0d97118cd7da10f4
-
SSDEEP
1536:LWRjo2iV+GhVYEaMltNsRS1giSyJRNERHdXh/e:LGE2iV+GhFtNK9
Score9/10-
Contacts a large (54423) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Renames itself
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Enumerates running processes
Discovers information about currently running processes on the system
-
Reads process memory
Read the memory of a process through the /proc virtual filesystem. This can be used to steal credentials.
-