General
-
Target
loligang.mpsl.elf
-
Size
89KB
-
Sample
241222-xym8dawqhq
-
MD5
9a397c973a66d7380ca64d61070b88d3
-
SHA1
f6828d001883357d22adf948b087ca400c5498dc
-
SHA256
67b7d4c356522d870024d4f04289dc6bcc53537209478fe43347511abb7e63fc
-
SHA512
18c4d902787043acdc63b3640f6e405dc8f96be38fbd40664595b1c6224adddcfc7895a20417a0de140c8280dc117f3dc7e9bcbb9336b8f0eabfb9f44d7adb77
-
SSDEEP
1536:NYCYxrXP40ODyPwHRQ9PlzTRfyToNoZqCi:qCYxrKDy46Nr
Behavioral task
behavioral1
Sample
loligang.mpsl.elf
Resource
debian12-mipsel-20240221-en
Malware Config
Extracted
mirai
LZRD
Targets
-
-
Target
loligang.mpsl.elf
-
Size
89KB
-
MD5
9a397c973a66d7380ca64d61070b88d3
-
SHA1
f6828d001883357d22adf948b087ca400c5498dc
-
SHA256
67b7d4c356522d870024d4f04289dc6bcc53537209478fe43347511abb7e63fc
-
SHA512
18c4d902787043acdc63b3640f6e405dc8f96be38fbd40664595b1c6224adddcfc7895a20417a0de140c8280dc117f3dc7e9bcbb9336b8f0eabfb9f44d7adb77
-
SSDEEP
1536:NYCYxrXP40ODyPwHRQ9PlzTRfyToNoZqCi:qCYxrKDy46Nr
Score9/10-
Contacts a large (20263) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Enumerates running processes
Discovers information about currently running processes on the system
-