General
-
Target
splx86.elf
-
Size
50KB
-
Sample
250310-ag9nqawsfw
-
MD5
c4b8d345f8f89b5846fcf0309100fc59
-
SHA1
3a089ef2fd5c38d6b84b7d1b893fb6153c0f386c
-
SHA256
2ff55d37ea403262068981390a796d119dc788bae4b7f5cf9e5b49ee788db5e5
-
SHA512
8e80a6c139acf1919f16b2b1242b77df0b7c3d5ebebcb71cff4fcc72762b4abafba7cb04fa431caf881d8dab01626e14a5d65acaa49409e3527ce08e96aafa7c
-
SSDEEP
1536:ih+EyOT1u9M2zg8rdB7J2yvv4hypTT76WPe:ih+7E1u9M+fB7YyyKTTnm
Behavioral task
behavioral1
Sample
splx86.elf
Resource
ubuntu2204-amd64-20250307-en
Malware Config
Extracted
mirai
BOTNET
Targets
-
-
Target
splx86.elf
-
Size
50KB
-
MD5
c4b8d345f8f89b5846fcf0309100fc59
-
SHA1
3a089ef2fd5c38d6b84b7d1b893fb6153c0f386c
-
SHA256
2ff55d37ea403262068981390a796d119dc788bae4b7f5cf9e5b49ee788db5e5
-
SHA512
8e80a6c139acf1919f16b2b1242b77df0b7c3d5ebebcb71cff4fcc72762b4abafba7cb04fa431caf881d8dab01626e14a5d65acaa49409e3527ce08e96aafa7c
-
SSDEEP
1536:ih+EyOT1u9M2zg8rdB7J2yvv4hypTT76WPe:ih+7E1u9M+fB7YyyKTTnm
Score9/10-
Contacts a large (66120) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Renames itself
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Enumerates running processes
Discovers information about currently running processes on the system
-