General
-
Target
loligang.mips.elf
-
Size
87KB
-
Sample
241125-qnysssvpaj
-
MD5
8c448911766f650cac90489adc1a8609
-
SHA1
816899d090f677b9b7bb99c7b33ba9283a721aa6
-
SHA256
54342ebb7797302119d1d1edc7bcb7348a3b285afb5be9d343f843d1cebe4e76
-
SHA512
de0c59299d78efe7786a5d4173ffb45a85151841cfe9c982a3cceea5fcfa1629677c20b9dc0b312886d56af32ba97eaef5ab58fbf35091a8393600b28ad8c5e8
-
SSDEEP
1536:9YxxZv7YjczMPcqNV0v3wm5Cz81m1dxmFa3fP0uiO03J:6TijnV0Pr5pm1dxmF+H0uTOJ
Behavioral task
behavioral1
Sample
loligang.mips.elf
Resource
debian9-mipsbe-20240611-en
Malware Config
Extracted
mirai
LZRD
Targets
-
-
Target
loligang.mips.elf
-
Size
87KB
-
MD5
8c448911766f650cac90489adc1a8609
-
SHA1
816899d090f677b9b7bb99c7b33ba9283a721aa6
-
SHA256
54342ebb7797302119d1d1edc7bcb7348a3b285afb5be9d343f843d1cebe4e76
-
SHA512
de0c59299d78efe7786a5d4173ffb45a85151841cfe9c982a3cceea5fcfa1629677c20b9dc0b312886d56af32ba97eaef5ab58fbf35091a8393600b28ad8c5e8
-
SSDEEP
1536:9YxxZv7YjczMPcqNV0v3wm5Cz81m1dxmFa3fP0uiO03J:6TijnV0Pr5pm1dxmF+H0uTOJ
Score9/10-
Contacts a large (20120) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Enumerates running processes
Discovers information about currently running processes on the system
-