General
-
Target
loligang.mips.elf
-
Size
87KB
-
Sample
241222-xbb7lavpgy
-
MD5
5f6d2539a443501c888fc90986479ee6
-
SHA1
1f1ce02f9cafc0e684559cd7e36170d6cba370dc
-
SHA256
5775d9b48bb5c73f8e4625ee86f07e33967aecca610947654e8eea692e200137
-
SHA512
3bd781322c46687a8d750c1129b843a2a2312b186094d5918d5d8eac8c0b04ef8ee14a6a14fb74eb557bdb6558f78301a597ee651c4ace2aa23ebe02554a7198
-
SSDEEP
1536:1YRdsnDd6C6gb/ZVyDYjMbwqZ9f0vfwW9ufY1C+KBtyRirfXDOiOg3J:CHsnD8/gb/zyDv9f0HD9FC+KBtyR6/D9
Behavioral task
behavioral1
Sample
loligang.mips.elf
Resource
debian9-mipsbe-20240729-en
Malware Config
Extracted
mirai
LZRD
Targets
-
-
Target
loligang.mips.elf
-
Size
87KB
-
MD5
5f6d2539a443501c888fc90986479ee6
-
SHA1
1f1ce02f9cafc0e684559cd7e36170d6cba370dc
-
SHA256
5775d9b48bb5c73f8e4625ee86f07e33967aecca610947654e8eea692e200137
-
SHA512
3bd781322c46687a8d750c1129b843a2a2312b186094d5918d5d8eac8c0b04ef8ee14a6a14fb74eb557bdb6558f78301a597ee651c4ace2aa23ebe02554a7198
-
SSDEEP
1536:1YRdsnDd6C6gb/ZVyDYjMbwqZ9f0vfwW9ufY1C+KBtyRirfXDOiOg3J:CHsnD8/gb/zyDv9f0HD9FC+KBtyR6/D9
Score9/10-
Contacts a large (16868) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Enumerates running processes
Discovers information about currently running processes on the system
-