General
-
Target
53deedcc375335665302254a3c350db57cc3609f586e9e828200074b589ae626.elf
-
Size
71KB
-
Sample
240212-eaxsssgb53
-
MD5
25242faa9a866789e8bf0b6610286a41
-
SHA1
6f400414c0c45d0577f6cf8e2540168641f78f49
-
SHA256
53deedcc375335665302254a3c350db57cc3609f586e9e828200074b589ae626
-
SHA512
70d322600a5261d73d1cae04b238f601af0c6d7adbdd0816d63de7efd8c828015d1b8cb5c0b69546385e9492d976f834b7f5a3bc87393bf834e3b239f9b01838
-
SSDEEP
1536:Qjn4Tb2ST0BzhNR42u3t7AArYgZwdBGglD9l+9i5Sea6AU2:3HfT0BzhEC2YgZwdBGLmSeavU2
Static task
static1
Behavioral task
behavioral1
Sample
53deedcc375335665302254a3c350db57cc3609f586e9e828200074b589ae626.elf
Resource
debian9-armhf-20231215-en
Malware Config
Targets
-
-
Target
53deedcc375335665302254a3c350db57cc3609f586e9e828200074b589ae626.elf
-
Size
71KB
-
MD5
25242faa9a866789e8bf0b6610286a41
-
SHA1
6f400414c0c45d0577f6cf8e2540168641f78f49
-
SHA256
53deedcc375335665302254a3c350db57cc3609f586e9e828200074b589ae626
-
SHA512
70d322600a5261d73d1cae04b238f601af0c6d7adbdd0816d63de7efd8c828015d1b8cb5c0b69546385e9492d976f834b7f5a3bc87393bf834e3b239f9b01838
-
SSDEEP
1536:Qjn4Tb2ST0BzhNR42u3t7AArYgZwdBGglD9l+9i5Sea6AU2:3HfT0BzhEC2YgZwdBGLmSeavU2
Score9/10-
Contacts a large (36846) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Changes its process name
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Enumerates active TCP sockets
Gets active TCP sockets from /proc virtual filesystem.
-
Enumerates running processes
Discovers information about currently running processes on the system
-