General
-
Target
meerkat.mips.elf
-
Size
102KB
-
Sample
241112-x8yf4azbrr
-
MD5
32140eb221573a4bd15ece871fee37d0
-
SHA1
d7be27d2fbcb5341eccd868087572c94f407316b
-
SHA256
d0c85e0905fcbf13c289d4670f387c722b08fdc619356340dbac9575d678e1ab
-
SHA512
b00706a1e53b0e9115c8f96bf1804de8342783e251cdca84be59a9cb20499ae44e4c86e477fe032e1adeef3ec532b90c942f508ff0173de74294e05dcc49d62b
-
SSDEEP
3072:DnxTMqWSiBdO/00ar55sOPfRyS+liITYbASlvAPam:r5ePVfRyS+liI80rPam
Behavioral task
behavioral1
Sample
meerkat.mips.elf
Resource
debian9-mipsbe-20240611-en
Malware Config
Extracted
mirai
LZRD
Targets
-
-
Target
meerkat.mips.elf
-
Size
102KB
-
MD5
32140eb221573a4bd15ece871fee37d0
-
SHA1
d7be27d2fbcb5341eccd868087572c94f407316b
-
SHA256
d0c85e0905fcbf13c289d4670f387c722b08fdc619356340dbac9575d678e1ab
-
SHA512
b00706a1e53b0e9115c8f96bf1804de8342783e251cdca84be59a9cb20499ae44e4c86e477fe032e1adeef3ec532b90c942f508ff0173de74294e05dcc49d62b
-
SSDEEP
3072:DnxTMqWSiBdO/00ar55sOPfRyS+liITYbASlvAPam:r5ePVfRyS+liI80rPam
Score9/10-
Contacts a large (23828) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-