General
-
Target
Josho.mpsl.elf
-
Size
69KB
-
Sample
241210-w6ltvatjfz
-
MD5
29d062f2f320c0b365243431e80e90f1
-
SHA1
09eedc222bf7b13d4735f2acd65dff895fe6e660
-
SHA256
94b8af2a35d19290ce247df4b4346f120f6f8474e31eb205a9689509f19f4865
-
SHA512
29417d51d79cb3c5212cdee6a68ffcd30885284d83e6d1956d1c34149ccf723b2a8b0740f0fbfd00d10c595d6154fe1aabf20578d674aefce2e37f3cf58f6a78
-
SSDEEP
768:QxNCJ0EYlDYhHnrwqsFDwLX3U6ngBhN6PNUpGXS5SyeweVKe0n3oNWpkmPqXitMF:QxNCJBYlZFwwjhwPTXSNxIKzn6CpC
Behavioral task
behavioral1
Sample
Josho.mpsl.elf
Resource
debian12-mipsel-20240221-en
Malware Config
Extracted
mirai
JOSHO
Targets
-
-
Target
Josho.mpsl.elf
-
Size
69KB
-
MD5
29d062f2f320c0b365243431e80e90f1
-
SHA1
09eedc222bf7b13d4735f2acd65dff895fe6e660
-
SHA256
94b8af2a35d19290ce247df4b4346f120f6f8474e31eb205a9689509f19f4865
-
SHA512
29417d51d79cb3c5212cdee6a68ffcd30885284d83e6d1956d1c34149ccf723b2a8b0740f0fbfd00d10c595d6154fe1aabf20578d674aefce2e37f3cf58f6a78
-
SSDEEP
768:QxNCJ0EYlDYhHnrwqsFDwLX3U6ngBhN6PNUpGXS5SyeweVKe0n3oNWpkmPqXitMF:QxNCJBYlZFwwjhwPTXSNxIKzn6CpC
Score9/10-
Contacts a large (82224) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Enumerates running processes
Discovers information about currently running processes on the system
-