General
-
Target
loligang.mpsl.elf
-
Size
91KB
-
Sample
241129-f1krlatkek
-
MD5
f01bc08d2f7ff88ee3aa689d3f857cbc
-
SHA1
d196796300e81a3a2f6810c07f77c762ef583fc3
-
SHA256
4d9f4f2f42004756ed83d5010836265f2d295d7cefd57b5f58d79a1ee44f47c2
-
SHA512
d603eabb7c882efee9f60b947c689194dd70a3999350eca26de7bd9fd7b0e685ccce6df0aca1b26e4943787cde017d73c3a04c092c1d16b513a0020016cb490d
-
SSDEEP
1536:LnCPs03z1A4OvKQwH34O9PdkMwCD/zMyzlNJI:WPs038vKDX4yW
Behavioral task
behavioral1
Sample
loligang.mpsl.elf
Resource
debian12-mipsel-20240221-en
Malware Config
Extracted
mirai
LZRD
Targets
-
-
Target
loligang.mpsl.elf
-
Size
91KB
-
MD5
f01bc08d2f7ff88ee3aa689d3f857cbc
-
SHA1
d196796300e81a3a2f6810c07f77c762ef583fc3
-
SHA256
4d9f4f2f42004756ed83d5010836265f2d295d7cefd57b5f58d79a1ee44f47c2
-
SHA512
d603eabb7c882efee9f60b947c689194dd70a3999350eca26de7bd9fd7b0e685ccce6df0aca1b26e4943787cde017d73c3a04c092c1d16b513a0020016cb490d
-
SSDEEP
1536:LnCPs03z1A4OvKQwH34O9PdkMwCD/zMyzlNJI:WPs038vKDX4yW
Score9/10-
Contacts a large (19793) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Enumerates running processes
Discovers information about currently running processes on the system
-