General
-
Target
armv6l.elf
-
Size
259KB
-
Sample
241017-rcpw7azglc
-
MD5
074922d9c3bf6f9be14310ea548575bf
-
SHA1
a45d1e104f4a8aba1c59a444a5115e18cc2859d7
-
SHA256
366e98a9113a97168c187c6a8491ecc1e290c1320908d3df158d7c92d37333f6
-
SHA512
22b6f8be118e69f41fd12632c102393aa0199141a300b3fc89043be413d34d47412a1e142b08eecbf06c021a7516fbbfcafd1c1478d9cc7297e743be980c62b2
-
SSDEEP
3072:1kCiVhTjd+YKqFmaHaA/WUq+VrHaYDiGa54ic2r2iB7:WCkTBq+FnY12i
Static task
static1
Behavioral task
behavioral1
Sample
armv6l.elf
Resource
debian9-armhf-20240611-en
Malware Config
Targets
-
-
Target
armv6l.elf
-
Size
259KB
-
MD5
074922d9c3bf6f9be14310ea548575bf
-
SHA1
a45d1e104f4a8aba1c59a444a5115e18cc2859d7
-
SHA256
366e98a9113a97168c187c6a8491ecc1e290c1320908d3df158d7c92d37333f6
-
SHA512
22b6f8be118e69f41fd12632c102393aa0199141a300b3fc89043be413d34d47412a1e142b08eecbf06c021a7516fbbfcafd1c1478d9cc7297e743be980c62b2
-
SSDEEP
3072:1kCiVhTjd+YKqFmaHaA/WUq+VrHaYDiGa54ic2r2iB7:WCkTBq+FnY12i
Score9/10-
Contacts a large (73652) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Deletes itself
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Reads network interface configuration
Fetches information about one or more active network interfaces.
-