General
-
Target
arm7.elf
-
Size
134KB
-
Sample
231103-ebmdfsbf5s
-
MD5
f5727685f7d0a4728f94b8f47d11a90a
-
SHA1
b648cdaa4d91b4a9db83f697a613086eaac8e4f6
-
SHA256
8fc5cfebdb403ad78b79b0e0805f3ca36394ea8bc23190722b4382f713f4c819
-
SHA512
b92dbee9540ee0d894d83fa0b2acebb6fdab0d93037a1ab09a9cee0e52d3f7db45ebb84707b692d1f99db9b01e7fb3f31177716325c52187394d263e1759f50b
-
SSDEEP
3072:eF6lvxDDVOyTrrOiC/qlQBcq3DZYcyWEwUnB7TxM/92:tlvxvVOyXrGilQBcq3DScinBRM/92
Behavioral task
behavioral1
Sample
arm7.elf
Resource
debian9-armhf-20231026-en
Malware Config
Extracted
mirai
BOTNET
Targets
-
-
Target
arm7.elf
-
Size
134KB
-
MD5
f5727685f7d0a4728f94b8f47d11a90a
-
SHA1
b648cdaa4d91b4a9db83f697a613086eaac8e4f6
-
SHA256
8fc5cfebdb403ad78b79b0e0805f3ca36394ea8bc23190722b4382f713f4c819
-
SHA512
b92dbee9540ee0d894d83fa0b2acebb6fdab0d93037a1ab09a9cee0e52d3f7db45ebb84707b692d1f99db9b01e7fb3f31177716325c52187394d263e1759f50b
-
SSDEEP
3072:eF6lvxDDVOyTrrOiC/qlQBcq3DZYcyWEwUnB7TxM/92:tlvxvVOyXrGilQBcq3DScinBRM/92
Score9/10-
Contacts a large (58179) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Changes its process name
-
Deletes itself
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Enumerates active TCP sockets
Gets active TCP sockets from /proc virtual filesystem.
-
Enumerates running processes
Discovers information about currently running processes on the system
-