General
-
Target
arm.elf
-
Size
114KB
-
Sample
241229-1fnmzaxpfk
-
MD5
50728716bbb3316434121160f54a0457
-
SHA1
e2821a2d04fd8332004110a4c68a8486d4489fdd
-
SHA256
27d13d2f3ecfa851961cceee52850b9a1a18a0acd72cd9a6c0e1d1ee13ff3715
-
SHA512
24657ee1f98580081ef44d31cb7c38a0324f3c7bbfd3abae0ed433019fd7b9af15ae87db0259bc740b73382ea8632e5e7312397fa7de06634362769d743a5fbf
-
SSDEEP
1536:amH6BXQ389Z+YkakZSkVTO1H+DPMnzDn6KeZWS5x5De6Qi6M5WwBNA0aCJtlxLvo:amaBXQaEOzDnlw7TdjQiJYwBFJ7vkt
Behavioral task
behavioral1
Sample
arm.elf
Resource
debian9-armhf-20240729-en
Malware Config
Extracted
mirai
OWARI
Targets
-
-
Target
arm.elf
-
Size
114KB
-
MD5
50728716bbb3316434121160f54a0457
-
SHA1
e2821a2d04fd8332004110a4c68a8486d4489fdd
-
SHA256
27d13d2f3ecfa851961cceee52850b9a1a18a0acd72cd9a6c0e1d1ee13ff3715
-
SHA512
24657ee1f98580081ef44d31cb7c38a0324f3c7bbfd3abae0ed433019fd7b9af15ae87db0259bc740b73382ea8632e5e7312397fa7de06634362769d743a5fbf
-
SSDEEP
1536:amH6BXQ389Z+YkakZSkVTO1H+DPMnzDn6KeZWS5x5De6Qi6M5WwBNA0aCJtlxLvo:amaBXQaEOzDnlw7TdjQiJYwBFJ7vkt
Score9/10-
Contacts a large (49343) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-