General
-
Target
g4za.x86
-
Size
73KB
-
Sample
250328-arj6taskx8
-
MD5
6e6e1cb80bda1d51af6f8d328ce42660
-
SHA1
bf3dfdded3080eed20c455899c52c2f042d7b63b
-
SHA256
1c7ec27edb1e1b5bce7ce676777a0dd9e0bf709db0acaf7053b12b38ec03fb6c
-
SHA512
f694618767a0b01cf0fe84474b1ba8a0cb3074857b05fcab2095bf283d1899b9d3f3b3b4403d53b464361e6398bf35da82694e606d358934a3608b0598d086e8
-
SSDEEP
1536:GD8VBnK13Rg74kwVJStv0qkxAOHItu9ApGZp8GXPTbVhid/Sb:G0BKRRg74kWS90q9k4uGsj8G7ZUdc
Behavioral task
behavioral1
Sample
g4za.x86
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral2
Sample
g4za.x86
Resource
ubuntu2004-amd64-20240611-en
Behavioral task
behavioral3
Sample
g4za.x86
Resource
ubuntu2204-amd64-20250307-en
Malware Config
Extracted
mirai
WICKED
Targets
-
-
Target
g4za.x86
-
Size
73KB
-
MD5
6e6e1cb80bda1d51af6f8d328ce42660
-
SHA1
bf3dfdded3080eed20c455899c52c2f042d7b63b
-
SHA256
1c7ec27edb1e1b5bce7ce676777a0dd9e0bf709db0acaf7053b12b38ec03fb6c
-
SHA512
f694618767a0b01cf0fe84474b1ba8a0cb3074857b05fcab2095bf283d1899b9d3f3b3b4403d53b464361e6398bf35da82694e606d358934a3608b0598d086e8
-
SSDEEP
1536:GD8VBnK13Rg74kwVJStv0qkxAOHItu9ApGZp8GXPTbVhid/Sb:G0BKRRg74kWS90q9k4uGsj8G7ZUdc
-
Contacts a large (122839) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Enumerates running processes
Discovers information about currently running processes on the system
-
Reads process memory
Read the memory of a process through the /proc virtual filesystem. This can be used to steal credentials.
-