General
-
Target
xd.arm7.elf
-
Size
59KB
-
Sample
241115-cjzyeawmdv
-
MD5
855d0afecb81c5833f82ebf8d591bf23
-
SHA1
9a67a7868ce43e34db69c6186be3fe9a3508c359
-
SHA256
9b12b76edf0387c89a4d6fe52bf68416e103a8061faddc5e3437801b2a005fda
-
SHA512
31b70906be87e36730bd167e99815ce7e6c1bb7235ee57f5c6078ebfe1feb68585066940781cb63035d25de5f4b61f052d54d68fa5c7cf4ca81533d9ec13c7e5
-
SSDEEP
1536:mZRk1dyyuyULwSEMtMeoRcHu7MBc6ILu0h+sUhha:L1rU8SyIO7MBc6ILlhCha
Behavioral task
behavioral1
Sample
xd.arm7.elf
Resource
debian9-armhf-20240611-en
Malware Config
Extracted
mirai
LZRD
Targets
-
-
Target
xd.arm7.elf
-
Size
59KB
-
MD5
855d0afecb81c5833f82ebf8d591bf23
-
SHA1
9a67a7868ce43e34db69c6186be3fe9a3508c359
-
SHA256
9b12b76edf0387c89a4d6fe52bf68416e103a8061faddc5e3437801b2a005fda
-
SHA512
31b70906be87e36730bd167e99815ce7e6c1bb7235ee57f5c6078ebfe1feb68585066940781cb63035d25de5f4b61f052d54d68fa5c7cf4ca81533d9ec13c7e5
-
SSDEEP
1536:mZRk1dyyuyULwSEMtMeoRcHu7MBc6ILu0h+sUhha:L1rU8SyIO7MBc6ILlhCha
-
Mirai family
-
Contacts a large (20523) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Enumerates running processes
Discovers information about currently running processes on the system
-
Reads process memory
Read the memory of a process through the /proc virtual filesystem. This can be used to steal credentials.
-