General
-
Target
meerkat.mpsl.elf
-
Size
106KB
-
Sample
241112-x8yrvsspak
-
MD5
0ba4d5e0b8979db40263569d0a00e0ea
-
SHA1
1d123fc6b2f6815946985fa882469e84a29eb8c7
-
SHA256
dedb091ebd4b77f40694fe37f58b72b8347e8ea06f6c4b10d741db28230a2cd9
-
SHA512
4d4078481680290e5fa7e00f9b677e12ef2b0bdd40be212f455d0f865233099aa6fce15c9d8a3c298affa492c972b04945165c68a72bb468caa58ffc1e1c756e
-
SSDEEP
1536:mNK/DoMWrTnIEb9An4SBSBCrGTHdp9Z/+eaz0HN:mNK/MMWrR9bOcHdjckN
Behavioral task
behavioral1
Sample
meerkat.mpsl.elf
Resource
debian9-mipsel-20240729-en
Malware Config
Extracted
mirai
LZRD
Targets
-
-
Target
meerkat.mpsl.elf
-
Size
106KB
-
MD5
0ba4d5e0b8979db40263569d0a00e0ea
-
SHA1
1d123fc6b2f6815946985fa882469e84a29eb8c7
-
SHA256
dedb091ebd4b77f40694fe37f58b72b8347e8ea06f6c4b10d741db28230a2cd9
-
SHA512
4d4078481680290e5fa7e00f9b677e12ef2b0bdd40be212f455d0f865233099aa6fce15c9d8a3c298affa492c972b04945165c68a72bb468caa58ffc1e1c756e
-
SSDEEP
1536:mNK/DoMWrTnIEb9An4SBSBCrGTHdp9Z/+eaz0HN:mNK/MMWrR9bOcHdjckN
Score9/10-
Contacts a large (23989) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-