General
-
Target
dvwkja7.elf
-
Size
50KB
-
Sample
241114-dp6tkssrex
-
MD5
1fd1d4c09b1c1026184e73fe59e83d8b
-
SHA1
4eaadfe62344676092d4d7917ddaab5b99643f0d
-
SHA256
f61704e951df85cef6efedaf3652904fbc1bdc8a6d59ea5fc31dcf57c355b2ea
-
SHA512
cf1926eb9aad95a5053fb8ecd5c45272abba08a37aaf9b3550d4afd144986cf2d55624902f1dbb8a19c0af2268932652996c320732a2c9027ac56d98a4dec0e6
-
SSDEEP
1536:uCoqsGR4eB3g0Vmh1IxIpC8JjL9VE8amFZP7R3Q:Xoqs2Twh6P8JjLJ9ZP7R3Q
Behavioral task
behavioral1
Sample
dvwkja7.elf
Resource
debian12-armhf-20240221-en
Malware Config
Extracted
mirai
SORA
Targets
-
-
Target
dvwkja7.elf
-
Size
50KB
-
MD5
1fd1d4c09b1c1026184e73fe59e83d8b
-
SHA1
4eaadfe62344676092d4d7917ddaab5b99643f0d
-
SHA256
f61704e951df85cef6efedaf3652904fbc1bdc8a6d59ea5fc31dcf57c355b2ea
-
SHA512
cf1926eb9aad95a5053fb8ecd5c45272abba08a37aaf9b3550d4afd144986cf2d55624902f1dbb8a19c0af2268932652996c320732a2c9027ac56d98a4dec0e6
-
SSDEEP
1536:uCoqsGR4eB3g0Vmh1IxIpC8JjL9VE8amFZP7R3Q:Xoqs2Twh6P8JjLJ9ZP7R3Q
Score10/10-
Mirai family
-
Contacts a large (165593) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-