General
-
Target
loligang.arm.elf
-
Size
72KB
-
Sample
241128-svq3msxlbm
-
MD5
ec6142136efb64f3ce22b244589320fc
-
SHA1
5b875843504d3f6eeeffe588bd6c80e0bf6c1c7b
-
SHA256
4bf8f19be359d9fb6cef4e450ce7914e85e3212a0f964849265e8ae73208c2e4
-
SHA512
e00da5bf6d41e85644f2852c488ff210a4e7be1df2d5e5f436f7df27bdd04902ca302a1bfcaaaf75875b2674b87d2fb1c40d42b94b361761b323d94f34220556
-
SSDEEP
1536:Q9d4L7PGGnAJ0zh/YmBZkaNjczfDadPhZ2/FkYJeZWdu3vy6M:Q9d4LNJhUFkkwMu3qD
Behavioral task
behavioral1
Sample
loligang.arm.elf
Resource
debian9-armhf-20240418-en
Malware Config
Extracted
mirai
LZRD
Targets
-
-
Target
loligang.arm.elf
-
Size
72KB
-
MD5
ec6142136efb64f3ce22b244589320fc
-
SHA1
5b875843504d3f6eeeffe588bd6c80e0bf6c1c7b
-
SHA256
4bf8f19be359d9fb6cef4e450ce7914e85e3212a0f964849265e8ae73208c2e4
-
SHA512
e00da5bf6d41e85644f2852c488ff210a4e7be1df2d5e5f436f7df27bdd04902ca302a1bfcaaaf75875b2674b87d2fb1c40d42b94b361761b323d94f34220556
-
SSDEEP
1536:Q9d4L7PGGnAJ0zh/YmBZkaNjczfDadPhZ2/FkYJeZWdu3vy6M:Q9d4LNJhUFkkwMu3qD
Score9/10-
Contacts a large (20407) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Enumerates running processes
Discovers information about currently running processes on the system
-