General
-
Target
loligang.mpsl.elf
-
Size
103KB
-
Sample
241130-q5f93svrav
-
MD5
8a608a30b3bec3eb52a19a979e016c22
-
SHA1
03314f499acd0cd6bff02e091359bfa51eefdf11
-
SHA256
9ee1ffe3520dca4f434ae9cdd9bc0f6aa3dfab036a0928ac161a5290eb407e45
-
SHA512
f1d806a476d18321470cbb267348165a9ecc36d0d6988c1af441bb0dbeb4a129086a18bcf5ac757e55cdb0395f9e4bd7298f00fec7dfea43cce2abbf2699c0c9
-
SSDEEP
1536:d7fjpr4NEQu3p0ZwIGH5PbpTBRRtBeiZebzELYRiYp:d7fjpr53pndeis982
Behavioral task
behavioral1
Sample
loligang.mpsl.elf
Resource
debian9-mipsel-20240226-en
Malware Config
Extracted
mirai
LZRD
Targets
-
-
Target
loligang.mpsl.elf
-
Size
103KB
-
MD5
8a608a30b3bec3eb52a19a979e016c22
-
SHA1
03314f499acd0cd6bff02e091359bfa51eefdf11
-
SHA256
9ee1ffe3520dca4f434ae9cdd9bc0f6aa3dfab036a0928ac161a5290eb407e45
-
SHA512
f1d806a476d18321470cbb267348165a9ecc36d0d6988c1af441bb0dbeb4a129086a18bcf5ac757e55cdb0395f9e4bd7298f00fec7dfea43cce2abbf2699c0c9
-
SSDEEP
1536:d7fjpr4NEQu3p0ZwIGH5PbpTBRRtBeiZebzELYRiYp:d7fjpr53pndeis982
Score9/10-
Contacts a large (20505) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Enumerates running processes
Discovers information about currently running processes on the system
-