General
-
Target
vcimanagement.armv7l.elf
-
Size
185KB
-
Sample
241230-mxm6waxnfz
-
MD5
1e69e0298d555e40144de7e2c620a70f
-
SHA1
ce97619614500791f6f25e1a35660860fb6a810c
-
SHA256
62520cfd3234028d0b5d824b73c9db271843424e4cfa78e9931f06fd290f747e
-
SHA512
3d19690c6310f090ed36a86c9adf86e8e2e0552572ff075e3bf939007be23bd777e2d66bf60a266cd63ca4697156f64128807e9194856ff594a6d4c73dc11cf1
-
SSDEEP
3072:OGep94UJx5CqNVDaTDLlpMtyhryb+RCYKTci228GM/9vIWmvtg4yFBZUyNL:ONvDaTDLlpMYhrRCYmci2OM/9gWmvtgt
Behavioral task
behavioral1
Sample
vcimanagement.armv7l.elf
Resource
debian12-armhf-20240221-en
Malware Config
Targets
-
-
Target
vcimanagement.armv7l.elf
-
Size
185KB
-
MD5
1e69e0298d555e40144de7e2c620a70f
-
SHA1
ce97619614500791f6f25e1a35660860fb6a810c
-
SHA256
62520cfd3234028d0b5d824b73c9db271843424e4cfa78e9931f06fd290f747e
-
SHA512
3d19690c6310f090ed36a86c9adf86e8e2e0552572ff075e3bf939007be23bd777e2d66bf60a266cd63ca4697156f64128807e9194856ff594a6d4c73dc11cf1
-
SSDEEP
3072:OGep94UJx5CqNVDaTDLlpMtyhryb+RCYKTci228GM/9vIWmvtg4yFBZUyNL:ONvDaTDLlpMYhrRCYmci2OM/9gWmvtgt
Score9/10-
Contacts a large (23532) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Reads process memory
Read the memory of a process through the /proc virtual filesystem. This can be used to steal credentials.
-