General
-
Target
arm7.elf
-
Size
201KB
-
Sample
241229-x53lmswkes
-
MD5
939406d5d370d1a039a9b0829d910b05
-
SHA1
bb57f12fd67203f883797bc83760bad871e0b386
-
SHA256
d1eb6155452f3ab97e2df1311a93514c6c4be839810a31307404b22a21ca400f
-
SHA512
c1cf7c03d70c992acb0f29404552ac5ceb952a173a581ccf46dad9c4ce4973f675a612132ee8c375c0656d4dabe7e9c28a78e6d0f8f5c3ba3bb252308be2466b
-
SSDEEP
6144:hTp5awLcubcu/vcrnfaVXkiGmxRi0Zk9UyVNM/9BuSY7:hTnawLcuIu/unfaVXkiGmTZmp6/aL
Behavioral task
behavioral1
Sample
arm7.elf
Resource
debian9-armhf-20240418-en
Malware Config
Extracted
mirai
OWARI
Targets
-
-
Target
arm7.elf
-
Size
201KB
-
MD5
939406d5d370d1a039a9b0829d910b05
-
SHA1
bb57f12fd67203f883797bc83760bad871e0b386
-
SHA256
d1eb6155452f3ab97e2df1311a93514c6c4be839810a31307404b22a21ca400f
-
SHA512
c1cf7c03d70c992acb0f29404552ac5ceb952a173a581ccf46dad9c4ce4973f675a612132ee8c375c0656d4dabe7e9c28a78e6d0f8f5c3ba3bb252308be2466b
-
SSDEEP
6144:hTp5awLcubcu/vcrnfaVXkiGmxRi0Zk9UyVNM/9BuSY7:hTnawLcuIu/unfaVXkiGmTZmp6/aL
Score9/10-
Contacts a large (49326) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-