General
-
Target
meerkat.arm.elf
-
Size
85KB
-
Sample
241112-x8yrvsspal
-
MD5
6692e37013bfe2b7ef6264cb7f4cdc2c
-
SHA1
bd0c76d971d900dec846904a75a254bd2a651abd
-
SHA256
d3c2fb9ba2b21aeb8605d6997e8a0520723294e49df3718e3affa10b744879bb
-
SHA512
7793f1768ce3fc26597a74281f0655bd9f5dbf0a4ff3312e747759fb8eab8e9525b97398bc7201ff6090643d68592023792b0c21c26bcd1d3a1b70786083a053
-
SSDEEP
1536:x1O0ykyDy+AHLrP+zjdbYnLsQT7Lp2V259ATz4WbLuOWXcqU1lLH8hP6juJ5QB2G:xI0zyDy+A18WX74FchCjuiIuH
Behavioral task
behavioral1
Sample
meerkat.arm.elf
Resource
debian9-armhf-20240611-en
Malware Config
Extracted
mirai
LZRD
Targets
-
-
Target
meerkat.arm.elf
-
Size
85KB
-
MD5
6692e37013bfe2b7ef6264cb7f4cdc2c
-
SHA1
bd0c76d971d900dec846904a75a254bd2a651abd
-
SHA256
d3c2fb9ba2b21aeb8605d6997e8a0520723294e49df3718e3affa10b744879bb
-
SHA512
7793f1768ce3fc26597a74281f0655bd9f5dbf0a4ff3312e747759fb8eab8e9525b97398bc7201ff6090643d68592023792b0c21c26bcd1d3a1b70786083a053
-
SSDEEP
1536:x1O0ykyDy+AHLrP+zjdbYnLsQT7Lp2V259ATz4WbLuOWXcqU1lLH8hP6juJ5QB2G:xI0zyDy+A18WX74FchCjuiIuH
Score9/10-
Contacts a large (23035) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Enumerates running processes
Discovers information about currently running processes on the system
-