General
-
Target
arm7.elf
-
Size
193KB
-
Sample
231012-1w7e1see25
-
MD5
bdc72c56f1569fb173908262c6d31861
-
SHA1
979ec04befef45079c027419ea3e41422fd33520
-
SHA256
190bf4e62e26ea5e20fc7d64890c388f221a1342ff374dc39b704af1b70b0772
-
SHA512
68f5d467ac8e31d22810124d098d03a18ff16e8ae328c8b48aee53bed27a776b2a5c7ca98170020c8a231569641fdfd146b460b094805ac40b198c43af807013
-
SSDEEP
6144:CUtcDtF0WQBB0abFymktTe77PCLyfJM/RfsmkjF:CUtcMBB0abFymktKPTfS/GR
Behavioral task
behavioral1
Sample
arm7.elf
Resource
debian9-armhf-20230831-en
Malware Config
Extracted
mirai
UNSTABLE
mirai.diicot.net
yukiscan.zc.al
Targets
-
-
Target
arm7.elf
-
Size
193KB
-
MD5
bdc72c56f1569fb173908262c6d31861
-
SHA1
979ec04befef45079c027419ea3e41422fd33520
-
SHA256
190bf4e62e26ea5e20fc7d64890c388f221a1342ff374dc39b704af1b70b0772
-
SHA512
68f5d467ac8e31d22810124d098d03a18ff16e8ae328c8b48aee53bed27a776b2a5c7ca98170020c8a231569641fdfd146b460b094805ac40b198c43af807013
-
SSDEEP
6144:CUtcDtF0WQBB0abFymktTe77PCLyfJM/RfsmkjF:CUtcMBB0abFymktKPTfS/GR
Score9/10-
Contacts a large (72816) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Changes its process name
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Enumerates running processes
Discovers information about currently running processes on the system
-
Writes file to system bin folder
-