General
-
Target
la.bot.mipsel.elf
-
Size
79KB
-
Sample
241018-f4eprasfmp
-
MD5
13b049ec9eb7519cec85124daca47dbf
-
SHA1
6157249e6703edffeb5e0f41f496f5a3a131a15c
-
SHA256
520c6faa57e3820aeba3326e7af423e782fc7adf91f2c361328f4d50a5f2edd0
-
SHA512
76a9b4558c0a94727acb4e5f1175e6adb87de8505441be5e30ef862484bf09e4202808b0c4a745ea6f6cbd2a1b27966699c98ef6357eb01628fd4ef98f205a11
-
SSDEEP
1536:Nqjp+RuQ/4xMaaBg1uBRfFmz4oL2rjKZb+o5a:NKE/4xMaau1uBVLjKO
Static task
static1
Behavioral task
behavioral1
Sample
la.bot.mipsel.elf
Resource
debian12-mipsel-20240221-en
Malware Config
Targets
-
-
Target
la.bot.mipsel.elf
-
Size
79KB
-
MD5
13b049ec9eb7519cec85124daca47dbf
-
SHA1
6157249e6703edffeb5e0f41f496f5a3a131a15c
-
SHA256
520c6faa57e3820aeba3326e7af423e782fc7adf91f2c361328f4d50a5f2edd0
-
SHA512
76a9b4558c0a94727acb4e5f1175e6adb87de8505441be5e30ef862484bf09e4202808b0c4a745ea6f6cbd2a1b27966699c98ef6357eb01628fd4ef98f205a11
-
SSDEEP
1536:Nqjp+RuQ/4xMaaBg1uBRfFmz4oL2rjKZb+o5a:NKE/4xMaau1uBVLjKO
Score7/10-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Renames itself
-
Reads process memory
Read the memory of a process through the /proc virtual filesystem. This can be used to steal credentials.
-