General
-
Target
xd.arm7.elf
-
Size
52KB
-
Sample
231002-nz5z5shh6v
-
MD5
fabc720108a88836b1c89fceba5f8bd5
-
SHA1
723150e31d1828a05631dec2567fb62534a67a40
-
SHA256
170e7226c064bd77b2582c20bac31cb4ae964d5ec23b54165401a3ab0551408b
-
SHA512
5698ea6cbd5176246ae17e985323458128dbea733a258eabbed5b8c7ff07df3421b6c3013f460c997a18d5f141abf41139e9ecc0da52dc54aec3ec62995ee4ca
-
SSDEEP
768:BMte5B4PACtw/YcmRIe18D9q63TxZQbSORe7Su2QJnKE79TLrN9q3UELbOs8qMLw:BM84ISRX63dZQbS5rzZgLIVmWjI
Malware Config
Extracted
mirai
LZRD
Targets
-
-
Target
xd.arm7.elf
-
Size
52KB
-
MD5
fabc720108a88836b1c89fceba5f8bd5
-
SHA1
723150e31d1828a05631dec2567fb62534a67a40
-
SHA256
170e7226c064bd77b2582c20bac31cb4ae964d5ec23b54165401a3ab0551408b
-
SHA512
5698ea6cbd5176246ae17e985323458128dbea733a258eabbed5b8c7ff07df3421b6c3013f460c997a18d5f141abf41139e9ecc0da52dc54aec3ec62995ee4ca
-
SSDEEP
768:BMte5B4PACtw/YcmRIe18D9q63TxZQbSORe7Su2QJnKE79TLrN9q3UELbOs8qMLw:BM84ISRX63dZQbS5rzZgLIVmWjI
-
Contacts a large (18255) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Enumerates active TCP sockets
Gets active TCP sockets from /proc virtual filesystem.
-