General
-
Target
xd.arm7.elf
-
Size
52KB
-
Sample
231001-r757nabf2t
-
MD5
95e813075034c19d4059daf502745ab9
-
SHA1
d755eba05bc3a68b73051c612f79f5a81f968650
-
SHA256
0774ac44c906a4612d13aef5ea11620de133ea8806f55c28a1752a211010f9b9
-
SHA512
eed95d24f1461d8db3f09aa5cf3a6fd3014ea870842dce4cd9b47a5fcc984d4b0e07db04dc318ab10c43667c9dd8eef5a9c0fe8fb6a644c2c1fc52c72ba8f725
-
SSDEEP
768:BMte5B4PACtw/YcmRIe18D9q63TxZQbSORe7Su2QJnKE79TLrRUaj9q3UELbOs82:BM84ISRX63dZQbS5rzZmaiLIVmWji
Malware Config
Extracted
mirai
LZRD
Targets
-
-
Target
xd.arm7.elf
-
Size
52KB
-
MD5
95e813075034c19d4059daf502745ab9
-
SHA1
d755eba05bc3a68b73051c612f79f5a81f968650
-
SHA256
0774ac44c906a4612d13aef5ea11620de133ea8806f55c28a1752a211010f9b9
-
SHA512
eed95d24f1461d8db3f09aa5cf3a6fd3014ea870842dce4cd9b47a5fcc984d4b0e07db04dc318ab10c43667c9dd8eef5a9c0fe8fb6a644c2c1fc52c72ba8f725
-
SSDEEP
768:BMte5B4PACtw/YcmRIe18D9q63TxZQbSORe7Su2QJnKE79TLrRUaj9q3UELbOs82:BM84ISRX63dZQbS5rzZmaiLIVmWji
-
Contacts a large (18731) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Enumerates active TCP sockets
Gets active TCP sockets from /proc virtual filesystem.
-