General
-
Target
mips.elf
-
Size
74KB
-
Sample
250310-arr7eswwax
-
MD5
6e5e926e7618f041a3be2305fd8cd5a6
-
SHA1
29b6b02a0b8959ff1769f34c3ffc55cf905f2ec8
-
SHA256
6cb427e528d9d6e68e43e97ff0f81ddd5768458159561d0fafdb5dffd0b6f7b2
-
SHA512
96a9f7a233f419e8b135535a79417b17e956c089a868050567a68111fdb9906185aa0ac1dbd77878bd6bd3acd9820aaf57a8474b3060a87993347e36e8e6959b
-
SSDEEP
1536:AKBK31576PhI6QXCjsJlEVNXdTmZZ+ZMStuxjBrxv:HIF57yhI1dJqsIM9xjdV
Behavioral task
behavioral1
Sample
mips.elf
Resource
debian9-mipsbe-20240611-en
Malware Config
Extracted
mirai
BOTNET
Targets
-
-
Target
mips.elf
-
Size
74KB
-
MD5
6e5e926e7618f041a3be2305fd8cd5a6
-
SHA1
29b6b02a0b8959ff1769f34c3ffc55cf905f2ec8
-
SHA256
6cb427e528d9d6e68e43e97ff0f81ddd5768458159561d0fafdb5dffd0b6f7b2
-
SHA512
96a9f7a233f419e8b135535a79417b17e956c089a868050567a68111fdb9906185aa0ac1dbd77878bd6bd3acd9820aaf57a8474b3060a87993347e36e8e6959b
-
SSDEEP
1536:AKBK31576PhI6QXCjsJlEVNXdTmZZ+ZMStuxjBrxv:HIF57yhI1dJqsIM9xjdV
Score9/10-
Contacts a large (161918) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Renames itself
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Enumerates running processes
Discovers information about currently running processes on the system
-
Reads process memory
Read the memory of a process through the /proc virtual filesystem. This can be used to steal credentials.
-