General
-
Target
la.bot.arm6.elf
-
Size
82KB
-
Sample
241123-h822ysxmal
-
MD5
18e3b6c44321a244852ec122d7e9a3ff
-
SHA1
06c253e3d29b2e4053c674031c90997f8a70bd85
-
SHA256
4f78767c86f0714dfcb39d6b90af663277ed6fb60f3fcd8415d84c5e659cd915
-
SHA512
95d55033ea1a8dd2e93654060780978bb1336685802dc807a3151f4632160969f3eb485d903ada39814e2e605877bc26c968ccfe584ddf967cadd8e4c71c4403
-
SSDEEP
1536:R7nF1w3yMDwuotJIFcZt8HPDxiT9LLSmIdZS7yb/rV3X4M+izLT9kGAwknCnzsTa:71w37DpotmFcgDxiT9vSmIfaG/hLT9k6
Static task
static1
Behavioral task
behavioral1
Sample
la.bot.arm6.elf
Resource
debian9-armhf-20240611-en
Malware Config
Targets
-
-
Target
la.bot.arm6.elf
-
Size
82KB
-
MD5
18e3b6c44321a244852ec122d7e9a3ff
-
SHA1
06c253e3d29b2e4053c674031c90997f8a70bd85
-
SHA256
4f78767c86f0714dfcb39d6b90af663277ed6fb60f3fcd8415d84c5e659cd915
-
SHA512
95d55033ea1a8dd2e93654060780978bb1336685802dc807a3151f4632160969f3eb485d903ada39814e2e605877bc26c968ccfe584ddf967cadd8e4c71c4403
-
SSDEEP
1536:R7nF1w3yMDwuotJIFcZt8HPDxiT9LLSmIdZS7yb/rV3X4M+izLT9kGAwknCnzsTa:71w37DpotmFcgDxiT9vSmIfaG/hLT9k6
Score9/10-
Contacts a large (21103) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Renames itself
-
Reads process memory
Read the memory of a process through the /proc virtual filesystem. This can be used to steal credentials.
-