General
-
Target
tmips.elf
-
Size
71KB
-
Sample
250309-tmlcvsvmz9
-
MD5
7b6299bcb1af34847306c2656df3208b
-
SHA1
e7e77d4a9b5e305424bfbe41484b7a3702527ccc
-
SHA256
aca8f632a8ffb39691b76c059849a453181423e4f55cc43c564c423b434d4a2d
-
SHA512
082fbe3b088f131ea6064aab0f3bea24b8613958bf31ea81ba773bff0bbd423b3a9ff66d03bb67d44e29057c3e406699fd242c251ef9d385b4c6dba9367c1da2
-
SSDEEP
1536:9byPF/43wV8i2aD2x2q0X76IcNxjWJ4w7PXfKi:APF/Ua8BY3yjj6PvL
Behavioral task
behavioral1
Sample
tmips.elf
Resource
debian9-mipsbe-20240611-en
Malware Config
Extracted
mirai
BOTNET
Targets
-
-
Target
tmips.elf
-
Size
71KB
-
MD5
7b6299bcb1af34847306c2656df3208b
-
SHA1
e7e77d4a9b5e305424bfbe41484b7a3702527ccc
-
SHA256
aca8f632a8ffb39691b76c059849a453181423e4f55cc43c564c423b434d4a2d
-
SHA512
082fbe3b088f131ea6064aab0f3bea24b8613958bf31ea81ba773bff0bbd423b3a9ff66d03bb67d44e29057c3e406699fd242c251ef9d385b4c6dba9367c1da2
-
SSDEEP
1536:9byPF/43wV8i2aD2x2q0X76IcNxjWJ4w7PXfKi:APF/Ua8BY3yjj6PvL
Score9/10-
Contacts a large (114962) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Renames itself
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Enumerates running processes
Discovers information about currently running processes on the system
-