General
-
Target
loligang.arm7.elf
-
Size
152KB
-
Sample
241224-xkrnmstqft
-
MD5
42ad320132c15ffed7c38e294490cc2e
-
SHA1
779fb9a6cf3b52c1a57193352da6d5126ab76b47
-
SHA256
4f994fdc0a89d2277f7fe89448c036337ca33cfb66b9e2d5058e0e37f9d2bda6
-
SHA512
b85869203f9530127908dfc0cdf34977fa986a4b5c728eb63c531ccdce28e1e9bf4ed41ec44c5064172ac77876e7cda11a84b5c66a56520d311b75d36bd7757d
-
SSDEEP
3072:ye9bqia5r9J5o9yhpZPH+9mrsplDKZU2QBKXAVanxX+F8JyvIT+hLBA4emlEBDzr:ye9bqia5r97o9yhpZv+9mrsplDKZU2QC
Behavioral task
behavioral1
Sample
loligang.arm7.elf
Resource
debian12-armhf-20240221-en
Malware Config
Extracted
mirai
LZRD
Targets
-
-
Target
loligang.arm7.elf
-
Size
152KB
-
MD5
42ad320132c15ffed7c38e294490cc2e
-
SHA1
779fb9a6cf3b52c1a57193352da6d5126ab76b47
-
SHA256
4f994fdc0a89d2277f7fe89448c036337ca33cfb66b9e2d5058e0e37f9d2bda6
-
SHA512
b85869203f9530127908dfc0cdf34977fa986a4b5c728eb63c531ccdce28e1e9bf4ed41ec44c5064172ac77876e7cda11a84b5c66a56520d311b75d36bd7757d
-
SSDEEP
3072:ye9bqia5r9J5o9yhpZPH+9mrsplDKZU2QBKXAVanxX+F8JyvIT+hLBA4emlEBDzr:ye9bqia5r97o9yhpZv+9mrsplDKZU2QC
Score9/10-
Contacts a large (20471) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Enumerates running processes
Discovers information about currently running processes on the system
-