General
-
Target
loligang.mips.elf
-
Size
87KB
-
Sample
241212-w5f7zavlgk
-
MD5
e15a5300a166fd96e51bf7da8e7a08ab
-
SHA1
0bf3ef103d49998caa3231334738222279832eb6
-
SHA256
5172dcf51fd501712a0b89b9ff4e63ede41754c63926a9ae6475f0a4763d0536
-
SHA512
82dd706f79283bdf4bdb627a66c0de33b09d59574bb4c78a6680ba183a5e7800a9a3ef02cafc4f9f243dc4f5bd2df5cf6faddc921cb96fe132277bfb5ad514a6
-
SSDEEP
1536:1YRdsnDd6C6gb/ZVyDYjMbwqZ9f0vfwW9ufY1C+KBtyRirfXDOiOj3J:CHsnD8/gb/zyDv9f0HD9FC+KBtyR6/DM
Behavioral task
behavioral1
Sample
loligang.mips.elf
Resource
debian9-mipsbe-20240729-en
Malware Config
Extracted
mirai
LZRD
Targets
-
-
Target
loligang.mips.elf
-
Size
87KB
-
MD5
e15a5300a166fd96e51bf7da8e7a08ab
-
SHA1
0bf3ef103d49998caa3231334738222279832eb6
-
SHA256
5172dcf51fd501712a0b89b9ff4e63ede41754c63926a9ae6475f0a4763d0536
-
SHA512
82dd706f79283bdf4bdb627a66c0de33b09d59574bb4c78a6680ba183a5e7800a9a3ef02cafc4f9f243dc4f5bd2df5cf6faddc921cb96fe132277bfb5ad514a6
-
SSDEEP
1536:1YRdsnDd6C6gb/ZVyDYjMbwqZ9f0vfwW9ufY1C+KBtyRirfXDOiOj3J:CHsnD8/gb/zyDv9f0HD9FC+KBtyR6/DM
Score9/10-
Contacts a large (20389) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Enumerates running processes
Discovers information about currently running processes on the system
-