General
-
Target
zerx86.elf
-
Size
45KB
-
Sample
250310-cf6lsaypv2
-
MD5
c17843bdb7476299eaf606d81b7388c8
-
SHA1
85d0bc55f005963f79ff74cf1c165526f4c14f21
-
SHA256
54b6884ce916a7fb61d580246410112f100e40fd4a799cafe7de0e1f26c293c6
-
SHA512
2e3b6547cc07912aaec377b07e5dcd5bc60caeb11b5027c229cc80a295e7d163cb5ca261a5b6a9132d55196fbec104b457b2803c0270f6b515acd930579b6ce2
-
SSDEEP
768:qK9Q8sbsAUkwsUnUZx0+xBrx0NrVk/0aW5Ag+yGQZz6PPjzrKw/YJt31Dxe0/F:L9Q8sbsAUkwsUnCx0+xBrx0Fy875Ag+W
Behavioral task
behavioral1
Sample
zerx86.elf
Resource
ubuntu2204-amd64-20250307-en
Malware Config
Extracted
mirai
BOTNET
Targets
-
-
Target
zerx86.elf
-
Size
45KB
-
MD5
c17843bdb7476299eaf606d81b7388c8
-
SHA1
85d0bc55f005963f79ff74cf1c165526f4c14f21
-
SHA256
54b6884ce916a7fb61d580246410112f100e40fd4a799cafe7de0e1f26c293c6
-
SHA512
2e3b6547cc07912aaec377b07e5dcd5bc60caeb11b5027c229cc80a295e7d163cb5ca261a5b6a9132d55196fbec104b457b2803c0270f6b515acd930579b6ce2
-
SSDEEP
768:qK9Q8sbsAUkwsUnUZx0+xBrx0NrVk/0aW5Ag+yGQZz6PPjzrKw/YJt31Dxe0/F:L9Q8sbsAUkwsUnCx0+xBrx0Fy875Ag+W
Score7/10-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Renames itself
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Enumerates running processes
Discovers information about currently running processes on the system
-