General
-
Target
la.bot.arm6.elf
-
Size
98KB
-
Sample
241121-pp5r3askhv
-
MD5
4fcc6412d60c01c8c6926b183fb42a12
-
SHA1
63246fbe1bea38302bde5304afbfaab33e55b35e
-
SHA256
55325321a02ee60b8c64d675d46191d5426e82746e97dfa6402db430156a5fc7
-
SHA512
2ee46ed4dd282d18aa08975bf752be0b0fffd3f42883780d003c26e0f9636c575f4e3306a54551b5e928e2411d68960879595ad5af6c1e2e9bddd344884c3c6f
-
SSDEEP
3072:dzWr4ovftsSXP0E9sB0PoS3fG4NFlQhahmnjaonL:d44ovftnF9s1SHNF6ha/A
Static task
static1
Behavioral task
behavioral1
Sample
la.bot.arm6.elf
Resource
debian9-armhf-20240611-en
Malware Config
Targets
-
-
Target
la.bot.arm6.elf
-
Size
98KB
-
MD5
4fcc6412d60c01c8c6926b183fb42a12
-
SHA1
63246fbe1bea38302bde5304afbfaab33e55b35e
-
SHA256
55325321a02ee60b8c64d675d46191d5426e82746e97dfa6402db430156a5fc7
-
SHA512
2ee46ed4dd282d18aa08975bf752be0b0fffd3f42883780d003c26e0f9636c575f4e3306a54551b5e928e2411d68960879595ad5af6c1e2e9bddd344884c3c6f
-
SSDEEP
3072:dzWr4ovftsSXP0E9sB0PoS3fG4NFlQhahmnjaonL:d44ovftnF9s1SHNF6ha/A
Score9/10-
Contacts a large (21208) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Renames itself
-
Reads process memory
Read the memory of a process through the /proc virtual filesystem. This can be used to steal credentials.
-