General
-
Target
loligang.arm.elf
-
Size
70KB
-
Sample
241222-yvyqdaxmev
-
MD5
1c618f00b42d778a9c3ab0e836974744
-
SHA1
fd8eabd990238dc4d9b39b1307c9b73662942493
-
SHA256
f9f449813b07d6f9b48fcd14d22d98f98fcaad93bb4d98e36d16c3f06b51d8df
-
SHA512
cdbd060f8ddbde0be0b477788867966c5c110fc199e11488845e40f6d57df9e4580588bdb89d33ad25e6c5d5c1460d227b8267351c192cc4af0cd624e0e71828
-
SSDEEP
1536:GbtexU5L9XouIRhb96pUQzXtwavaJ3V8OHxouJeZWDFI8/M:GbtexU0r8QCKw2FbE
Behavioral task
behavioral1
Sample
loligang.arm.elf
Resource
debian9-armhf-20240611-en
Malware Config
Extracted
mirai
LZRD
Targets
-
-
Target
loligang.arm.elf
-
Size
70KB
-
MD5
1c618f00b42d778a9c3ab0e836974744
-
SHA1
fd8eabd990238dc4d9b39b1307c9b73662942493
-
SHA256
f9f449813b07d6f9b48fcd14d22d98f98fcaad93bb4d98e36d16c3f06b51d8df
-
SHA512
cdbd060f8ddbde0be0b477788867966c5c110fc199e11488845e40f6d57df9e4580588bdb89d33ad25e6c5d5c1460d227b8267351c192cc4af0cd624e0e71828
-
SSDEEP
1536:GbtexU5L9XouIRhb96pUQzXtwavaJ3V8OHxouJeZWDFI8/M:GbtexU0r8QCKw2FbE
Score9/10-
Contacts a large (20657) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Enumerates running processes
Discovers information about currently running processes on the system
-