General
-
Target
loligang.mips.elf
-
Size
87KB
-
Sample
241218-p3kzta1kdn
-
MD5
ea424d48526e7ec8da35e167c5b3f4fb
-
SHA1
bf8ab87ec3f78a2e5e4d1ca716373c5d0557b8ab
-
SHA256
38a9660cc6cc2e81a8e22634deefd8e37e1f4fccb987c60a8d126317e922bdf9
-
SHA512
a2adc125fbfe4d714f9d135f058e7a43f3b084b8df8de2e9e1f2cb0445718294c910bafae4d54cde153b240fbd085c189ce1f6192e1db845ef7f01ed6e95249a
-
SSDEEP
1536:1YRdsnDd6C6gb/ZVyDYjMbwqZ9f0vfwW9ufY1C+KBtyRirfXDOiO+3J:CHsnD8/gb/zyDv9f0HD9FC+KBtyR6/Dn
Behavioral task
behavioral1
Sample
loligang.mips.elf
Resource
debian9-mipsbe-20240611-en
Malware Config
Extracted
mirai
LZRD
Targets
-
-
Target
loligang.mips.elf
-
Size
87KB
-
MD5
ea424d48526e7ec8da35e167c5b3f4fb
-
SHA1
bf8ab87ec3f78a2e5e4d1ca716373c5d0557b8ab
-
SHA256
38a9660cc6cc2e81a8e22634deefd8e37e1f4fccb987c60a8d126317e922bdf9
-
SHA512
a2adc125fbfe4d714f9d135f058e7a43f3b084b8df8de2e9e1f2cb0445718294c910bafae4d54cde153b240fbd085c189ce1f6192e1db845ef7f01ed6e95249a
-
SSDEEP
1536:1YRdsnDd6C6gb/ZVyDYjMbwqZ9f0vfwW9ufY1C+KBtyRirfXDOiO+3J:CHsnD8/gb/zyDv9f0HD9FC+KBtyR6/Dn
Score9/10-
Contacts a large (20033) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Enumerates running processes
Discovers information about currently running processes on the system
-