General
-
Target
702-1-0x00008000-0x00029794-memory.dmp
-
Size
89KB
-
Sample
250414-yjzhjazkv5
-
MD5
02df72634b0990f585526bd5e57192b7
-
SHA1
d16d1afed360148f8caa2cbec85a78d3dace60e9
-
SHA256
581808d5bbc01cadd2257915928dbc147ea1c783f71059e3f24763b09e476560
-
SHA512
673cd237f3d087f8f8b950570521c540bfabccebd5c5b8204646ab6ced15b1ddeb64dd2ce8a8244640ba07ce6197d910570d78c6fcc9578b02c798eee74283d3
-
SSDEEP
1536:6AnJr9LuyWmgddGe4XalHzbx8PKhEO9ljmi4NLCz7QHZeYHTvsT:3Vu+Ve4XalHzbx8PogNLCz7QHE8ET
Behavioral task
behavioral1
Sample
702-1-0x00008000-0x00029794-memory.dmp
Resource
debian9-armhf-20240418-en
Malware Config
Extracted
mirai
MIRAI
Targets
-
-
Target
702-1-0x00008000-0x00029794-memory.dmp
-
Size
89KB
-
MD5
02df72634b0990f585526bd5e57192b7
-
SHA1
d16d1afed360148f8caa2cbec85a78d3dace60e9
-
SHA256
581808d5bbc01cadd2257915928dbc147ea1c783f71059e3f24763b09e476560
-
SHA512
673cd237f3d087f8f8b950570521c540bfabccebd5c5b8204646ab6ced15b1ddeb64dd2ce8a8244640ba07ce6197d910570d78c6fcc9578b02c798eee74283d3
-
SSDEEP
1536:6AnJr9LuyWmgddGe4XalHzbx8PKhEO9ljmi4NLCz7QHZeYHTvsT:3Vu+Ve4XalHzbx8PogNLCz7QHE8ET
Score7/10-
Deletes itself
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-