General
-
Target
88e10bb097ce1060c1f2798a3cd7d94eccde25e260d7ec8b08731f47d6c1b692.elf
-
Size
78KB
-
Sample
241029-c5ejlatcpr
-
MD5
0d28778c12ca8187d7c25a39cbf139b5
-
SHA1
d6acf3d900bfa3cd334bbe4fb077aef271ef9b7b
-
SHA256
88e10bb097ce1060c1f2798a3cd7d94eccde25e260d7ec8b08731f47d6c1b692
-
SHA512
9ecdfd171809eee4b80289f341c1bf7a432b929e9eb5dd2659ff828ed0921476cfd79d6c0f475b04bf06d4fc55adb8bc6413a349b203ec5065e0182cac2134b9
-
SSDEEP
1536:Adhb3BXcohEINgqisu8dCfv2xWuWO7Mb7Ndb7z22fsPyA5HfrnI8sR4:Ibx/h2mSv2xWuYxA5/rnIy
Static task
static1
Behavioral task
behavioral1
Sample
88e10bb097ce1060c1f2798a3cd7d94eccde25e260d7ec8b08731f47d6c1b692.elf
Resource
debian9-mipsbe-20240611-en
Malware Config
Targets
-
-
Target
88e10bb097ce1060c1f2798a3cd7d94eccde25e260d7ec8b08731f47d6c1b692.elf
-
Size
78KB
-
MD5
0d28778c12ca8187d7c25a39cbf139b5
-
SHA1
d6acf3d900bfa3cd334bbe4fb077aef271ef9b7b
-
SHA256
88e10bb097ce1060c1f2798a3cd7d94eccde25e260d7ec8b08731f47d6c1b692
-
SHA512
9ecdfd171809eee4b80289f341c1bf7a432b929e9eb5dd2659ff828ed0921476cfd79d6c0f475b04bf06d4fc55adb8bc6413a349b203ec5065e0182cac2134b9
-
SSDEEP
1536:Adhb3BXcohEINgqisu8dCfv2xWuWO7Mb7Ndb7z22fsPyA5HfrnI8sR4:Ibx/h2mSv2xWuYxA5/rnIy
Score9/10-
Contacts a large (89783) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Renames itself
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Enumerates running processes
Discovers information about currently running processes on the system
-
Reads process memory
Read the memory of a process through the /proc virtual filesystem. This can be used to steal credentials.
-