General
-
Target
meerkat.arm7.elf
-
Size
163KB
-
Sample
241112-x81apaspam
-
MD5
fee06c31fd25bdfd971c5a35c31ac4b5
-
SHA1
2abdba915d86cc16754360b9d4536fed1bd1236c
-
SHA256
0c6ade258e6c07b31b300ef0bf9752354ce8252e875c487f0420a758e85ad6e3
-
SHA512
58c51a8a8e402427e4c92a68b60fd1b1e76558ca9f0b75d5bde2eef4dbb5d1abae06ef0caa75094de9ef935a49194f8d0ad082cd3026002a7ad8fa92877460b4
-
SSDEEP
3072:sYReNV2Bsb5s3fa8vM1a+vyJ+Lfnzjsp+T4CUM/9MoDhkilJM:sY0NEC2fa8vM1a+m+/4p+TuM/9XDzJM
Behavioral task
behavioral1
Sample
meerkat.arm7.elf
Resource
debian9-armhf-20240611-en
Malware Config
Extracted
mirai
LZRD
Targets
-
-
Target
meerkat.arm7.elf
-
Size
163KB
-
MD5
fee06c31fd25bdfd971c5a35c31ac4b5
-
SHA1
2abdba915d86cc16754360b9d4536fed1bd1236c
-
SHA256
0c6ade258e6c07b31b300ef0bf9752354ce8252e875c487f0420a758e85ad6e3
-
SHA512
58c51a8a8e402427e4c92a68b60fd1b1e76558ca9f0b75d5bde2eef4dbb5d1abae06ef0caa75094de9ef935a49194f8d0ad082cd3026002a7ad8fa92877460b4
-
SSDEEP
3072:sYReNV2Bsb5s3fa8vM1a+vyJ+Lfnzjsp+T4CUM/9MoDhkilJM:sY0NEC2fa8vM1a+m+/4p+TuM/9XDzJM
Score9/10-
Contacts a large (23505) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Enumerates running processes
Discovers information about currently running processes on the system
-