General
-
Target
697-1-0x00400000-0x00450c38-memory.dmp
-
Size
65KB
-
Sample
241213-a8wwyatjgx
-
MD5
171d706403a5accca74bd7abed4d839a
-
SHA1
c288f0de6b9f474ffe70b976f277a8955fd4d38f
-
SHA256
cb9250bd60d3282a5cf3c8c4d64c039ca19e346bee00d4b57a9b9b6739a9fdf8
-
SHA512
a40fa8f250598c7fe25943109721fd852c92ce648a7eec6aadf710953d01311f14bfad0b5fbde8a76b13da237c4b15d5ed29eac4d8ebfef6c49e3f6822ca5e64
-
SSDEEP
768:YQbnZz+D0GvXIdoy9l8wMrOZE3JLbwWehGXAZZaCAkdX9yYgFdPOZAl/rRUo:1bnZ4nyZ4wMryoehcAZZaa2bPOZAvUo
Behavioral task
behavioral1
Sample
697-1-0x00400000-0x00450c38-memory.dmp
Resource
debian9-mipsbe-20240418-en
Malware Config
Targets
-
-
Target
697-1-0x00400000-0x00450c38-memory.dmp
-
Size
65KB
-
MD5
171d706403a5accca74bd7abed4d839a
-
SHA1
c288f0de6b9f474ffe70b976f277a8955fd4d38f
-
SHA256
cb9250bd60d3282a5cf3c8c4d64c039ca19e346bee00d4b57a9b9b6739a9fdf8
-
SHA512
a40fa8f250598c7fe25943109721fd852c92ce648a7eec6aadf710953d01311f14bfad0b5fbde8a76b13da237c4b15d5ed29eac4d8ebfef6c49e3f6822ca5e64
-
SSDEEP
768:YQbnZz+D0GvXIdoy9l8wMrOZE3JLbwWehGXAZZaCAkdX9yYgFdPOZAl/rRUo:1bnZ4nyZ4wMryoehcAZZaa2bPOZAvUo
Score9/10-
Contacts a large (69905) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Enumerates running processes
Discovers information about currently running processes on the system
-