General
-
Target
loligang.mpsl.elf
-
Size
89KB
-
Sample
241218-p3kzta1kdm
-
MD5
e11bac278d87af5c2eb3771a738b92de
-
SHA1
e274cfb910e85ac8b05cb87dc325d92c28de381d
-
SHA256
6f16eacb53d3ec46cac764a5c6ff30cb3b781dd7a21b1c0da0d2004e5f143492
-
SHA512
537746dd70e59622dbd68d2a4b80ff84722d980a06373b6ec71987e0715db682f9376b69a644de4e3046ab6f81318373c36ce6c837c7e84063abadafe61a61f3
-
SSDEEP
1536:NYCYxrXP40ODyPwHRQ9PlzTRfyToNoZqci:qCYxrKDy46NZ
Behavioral task
behavioral1
Sample
loligang.mpsl.elf
Resource
debian12-mipsel-20240418-en
Malware Config
Extracted
mirai
LZRD
Targets
-
-
Target
loligang.mpsl.elf
-
Size
89KB
-
MD5
e11bac278d87af5c2eb3771a738b92de
-
SHA1
e274cfb910e85ac8b05cb87dc325d92c28de381d
-
SHA256
6f16eacb53d3ec46cac764a5c6ff30cb3b781dd7a21b1c0da0d2004e5f143492
-
SHA512
537746dd70e59622dbd68d2a4b80ff84722d980a06373b6ec71987e0715db682f9376b69a644de4e3046ab6f81318373c36ce6c837c7e84063abadafe61a61f3
-
SSDEEP
1536:NYCYxrXP40ODyPwHRQ9PlzTRfyToNoZqci:qCYxrKDy46NZ
Score9/10-
Contacts a large (20703) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Enumerates running processes
Discovers information about currently running processes on the system
-