General
-
Target
kwari.arm7.elf
-
Size
128KB
-
Sample
230827-1pxx1add74
-
MD5
b009dcd1228cd338949555f7a89b44bd
-
SHA1
ffc0bbb12c86575e1409e8e71060cd31fe00baa7
-
SHA256
50b3f3e3d7b8c64b6fcea2d9abcb2bf79ce73d633d77d967369a38dd787b0e18
-
SHA512
89f108eed2a12024fdc4846231a7b3e28d0a803852a7b1ccfcd324b640a8c33d79fc162da118a0c19a9296e8eb0ef273b6e5336838dd98ce008f1be776bf37a1
-
SSDEEP
3072:Hyb738YOScOHv8BFmeX0ZT8bGSvM/9LI/e:Hy/8YKOHv8BFHX0ibGKM/98/e
Behavioral task
behavioral1
Sample
kwari.arm7.elf
Resource
debian9-armhf-20221125-en
Malware Config
Extracted
mirai
KAIZEN
Targets
-
-
Target
kwari.arm7.elf
-
Size
128KB
-
MD5
b009dcd1228cd338949555f7a89b44bd
-
SHA1
ffc0bbb12c86575e1409e8e71060cd31fe00baa7
-
SHA256
50b3f3e3d7b8c64b6fcea2d9abcb2bf79ce73d633d77d967369a38dd787b0e18
-
SHA512
89f108eed2a12024fdc4846231a7b3e28d0a803852a7b1ccfcd324b640a8c33d79fc162da118a0c19a9296e8eb0ef273b6e5336838dd98ce008f1be776bf37a1
-
SSDEEP
3072:Hyb738YOScOHv8BFmeX0ZT8bGSvM/9LI/e:Hy/8YKOHv8BFHX0ibGKM/98/e
Score9/10-
Contacts a large (355149) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Changes its process name
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-