General
-
Target
loligang.x86.elf
-
Size
64KB
-
Sample
241212-w5fw7svlgj
-
MD5
03016c92a7920fa8c20578aeed9a6bc8
-
SHA1
079f4e92cd40e6c6cbeb44e97aa2a5b038cf33e5
-
SHA256
7ddcd50e0416e567d5ef8df927f7932324cddbb7991a46d30aadf0d224c422b1
-
SHA512
c3db3dc67dedcda41e3d279cb73684cf464c638e2622f5970e9e90b47c0f8e48f2a416d7643713cb5637564bf362dd6e587e252beb8c7f2082ac4424f808ee65
-
SSDEEP
1536:IoRC9170vwHbQXZ5+qXDEuXi90dSW7V/DjObeFt6PuQ4Zd:PC917iwHbQXZ5+qXA594SWZ/XObeb6G7
Behavioral task
behavioral1
Sample
loligang.x86.elf
Resource
ubuntu1804-amd64-20240611-en
Malware Config
Extracted
mirai
LZRD
Targets
-
-
Target
loligang.x86.elf
-
Size
64KB
-
MD5
03016c92a7920fa8c20578aeed9a6bc8
-
SHA1
079f4e92cd40e6c6cbeb44e97aa2a5b038cf33e5
-
SHA256
7ddcd50e0416e567d5ef8df927f7932324cddbb7991a46d30aadf0d224c422b1
-
SHA512
c3db3dc67dedcda41e3d279cb73684cf464c638e2622f5970e9e90b47c0f8e48f2a416d7643713cb5637564bf362dd6e587e252beb8c7f2082ac4424f808ee65
-
SSDEEP
1536:IoRC9170vwHbQXZ5+qXDEuXi90dSW7V/DjObeFt6PuQ4Zd:PC917iwHbQXZ5+qXA594SWZ/XObeb6G7
Score9/10-
Contacts a large (20419) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Enumerates running processes
Discovers information about currently running processes on the system
-