General
-
Target
arm7.elf
-
Size
169KB
-
Sample
241221-xaj6tawndn
-
MD5
361ad5318a419b87901ee5e007df7f01
-
SHA1
26b5b5c4b12084b0809b079c04380b5e20889ae1
-
SHA256
20fd8a6487fa9be0ccc353b5cbd9a2852081ee0f221a617a6d40030981b40153
-
SHA512
2472650c58123537d8eea7e7567db06d8d6638dc0d5c79c9cda1f81d67167ac10023c2190a2c838d016be42730b0d193515b457441e09bc080a60156d357afde
-
SSDEEP
3072:SsdHf6qiW4Cd6JwsmVhLXphfGiaUfsKB3rYmWVaEWKF85+LYRM/9TvgE:SsdHf6qqCd6RiXrOiaUfsKBcmAN25+Lh
Behavioral task
behavioral1
Sample
arm7.elf
Resource
debian9-armhf-20240729-en
Malware Config
Extracted
mirai
OWARI
Targets
-
-
Target
arm7.elf
-
Size
169KB
-
MD5
361ad5318a419b87901ee5e007df7f01
-
SHA1
26b5b5c4b12084b0809b079c04380b5e20889ae1
-
SHA256
20fd8a6487fa9be0ccc353b5cbd9a2852081ee0f221a617a6d40030981b40153
-
SHA512
2472650c58123537d8eea7e7567db06d8d6638dc0d5c79c9cda1f81d67167ac10023c2190a2c838d016be42730b0d193515b457441e09bc080a60156d357afde
-
SSDEEP
3072:SsdHf6qiW4Cd6JwsmVhLXphfGiaUfsKB3rYmWVaEWKF85+LYRM/9TvgE:SsdHf6qqCd6RiXrOiaUfsKBcmAN25+Lh
Score9/10-
Contacts a large (48734) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Enumerates running processes
Discovers information about currently running processes on the system
-