General
-
Target
loligang.mips.elf
-
Size
99KB
-
Sample
241130-q3hp5avqft
-
MD5
53aef66b569cda2866e69aecd58b5a8f
-
SHA1
07c607bcc93cbb44a43a774854a90356b0ebf11a
-
SHA256
d3d338fd5ed4422da395f715f621405edd7c11f883adb32ab6b5b9144b515f0d
-
SHA512
0fbf31b9668fb9a201611642314b774579db4d7a3eb71ccf9069a9b2c81bf90cb2f194346affe747f2a6ee7e9c9ca7fc0b50481887cddab5f995f9372fbaf531
-
SSDEEP
1536:pegXznytTDLmgKQ29A0v+iRbNxcLPkXK7wYvmG6aa7GBRd9:jiDEA0WKbNx3XK7wYv1jaiBf9
Behavioral task
behavioral1
Sample
loligang.mips.elf
Resource
debian9-mipsbe-20240611-en
Malware Config
Extracted
mirai
LZRD
Targets
-
-
Target
loligang.mips.elf
-
Size
99KB
-
MD5
53aef66b569cda2866e69aecd58b5a8f
-
SHA1
07c607bcc93cbb44a43a774854a90356b0ebf11a
-
SHA256
d3d338fd5ed4422da395f715f621405edd7c11f883adb32ab6b5b9144b515f0d
-
SHA512
0fbf31b9668fb9a201611642314b774579db4d7a3eb71ccf9069a9b2c81bf90cb2f194346affe747f2a6ee7e9c9ca7fc0b50481887cddab5f995f9372fbaf531
-
SSDEEP
1536:pegXznytTDLmgKQ29A0v+iRbNxcLPkXK7wYvmG6aa7GBRd9:jiDEA0WKbNx3XK7wYv1jaiBf9
Score9/10-
Contacts a large (19992) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Enumerates running processes
Discovers information about currently running processes on the system
-