General
-
Target
hydro.arm7-20230929-2339
-
Size
195KB
-
Sample
231001-whvf3scc6t
-
MD5
251f46edca421d4da86220cc92048b1c
-
SHA1
df01b7f4afac7b8626aac849fb03f4e68272b5c5
-
SHA256
560cb21a263fbcee95ad2ac5c9a34e94dc3c82c3a23fabba4dabc570adf6b9ee
-
SHA512
ecce17df87366c57132e39e8bc45082f7a510f617da83e81cb11692e9326252b85619150548a1ed195c69f72cb24fce12fd9b023c7f98f4e8c270a7efa2453b0
-
SSDEEP
6144:oBS9240WVaAm6aBpaoo4H4sQ8t2+CxM/RXjev:oBY2DAm6aBpaoo420C6/pw
Behavioral task
behavioral1
Sample
hydro.arm7-20230929-2339
Resource
debian9-armhf-en-20211208
Malware Config
Targets
-
-
Target
hydro.arm7-20230929-2339
-
Size
195KB
-
MD5
251f46edca421d4da86220cc92048b1c
-
SHA1
df01b7f4afac7b8626aac849fb03f4e68272b5c5
-
SHA256
560cb21a263fbcee95ad2ac5c9a34e94dc3c82c3a23fabba4dabc570adf6b9ee
-
SHA512
ecce17df87366c57132e39e8bc45082f7a510f617da83e81cb11692e9326252b85619150548a1ed195c69f72cb24fce12fd9b023c7f98f4e8c270a7efa2453b0
-
SSDEEP
6144:oBS9240WVaAm6aBpaoo4H4sQ8t2+CxM/RXjev:oBY2DAm6aBpaoo420C6/pw
Score9/10-
Contacts a large (47208) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Changes its process name
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Enumerates running processes
Discovers information about currently running processes on the system
-
Writes file to system bin folder
-