General
-
Target
la.bot.arm7-20230923-0250.elf
-
Size
68KB
-
Sample
230923-dbmtjsdg88
-
MD5
251f1ce8b73d3c2759a7c72c4d19e6a4
-
SHA1
3477664b93be74bfe5dcf866f0ae9094e0327f17
-
SHA256
0d63de3148dc3037625b4e0a3a69c24c56aca458076e96f3249463a3c51e0c1c
-
SHA512
8eac70e8154a526c4dc94251fc5e190ff30d816772b986a477b3a09f076fe660a94cc985c8f74cb1f7a8daff8bb994a35fbe279fa56102cea5146eebf96a9f34
-
SSDEEP
1536:CYnEXUhyrspE8OEXYfl9YAgbY3qP5A9XdQiuexld9l0Mi4BjhxNyf:2EhygpE8OTYZ8R9XdQiue2WBjhDy
Static task
static1
Behavioral task
behavioral1
Sample
la.bot.arm7-20230923-0250.elf
Resource
debian9-armhf-en-20211208
Malware Config
Targets
-
-
Target
la.bot.arm7-20230923-0250.elf
-
Size
68KB
-
MD5
251f1ce8b73d3c2759a7c72c4d19e6a4
-
SHA1
3477664b93be74bfe5dcf866f0ae9094e0327f17
-
SHA256
0d63de3148dc3037625b4e0a3a69c24c56aca458076e96f3249463a3c51e0c1c
-
SHA512
8eac70e8154a526c4dc94251fc5e190ff30d816772b986a477b3a09f076fe660a94cc985c8f74cb1f7a8daff8bb994a35fbe279fa56102cea5146eebf96a9f34
-
SSDEEP
1536:CYnEXUhyrspE8OEXYfl9YAgbY3qP5A9XdQiuexld9l0Mi4BjhxNyf:2EhygpE8OTYZ8R9XdQiue2WBjhDy
Score9/10-
Contacts a large (33004) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Changes its process name
-
Deletes itself
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Enumerates active TCP sockets
Gets active TCP sockets from /proc virtual filesystem.
-
Enumerates running processes
Discovers information about currently running processes on the system
-
Writes file to system bin folder
-