General
-
Target
loligang.arm.elf
-
Size
80KB
-
Sample
250101-vcs6dstjfs
-
MD5
8041a12e2093f22364b4576f59baa53a
-
SHA1
2005d320eb32a94e66359a4c614548ccb8841800
-
SHA256
2b706e649f14f65d18e6c83a2de37568de173cccf071c07a8c6de9f346673c13
-
SHA512
e1c8f86aaed766a6750a279f152efa161d35a9fddd4a4dc9f756b7993e367d0813f5df36d5732bbe75fc9b533d91e8c168e6ec7129b8cdf2b82f253b2d6cbb3c
-
SSDEEP
1536:UeQqvm1T9mgitxIdXSYF27hJFhY49+dxRGwa/JeZWbLZprtjYqR5M:UeQ6maUGwaxwOLZppcqRG
Behavioral task
behavioral1
Sample
loligang.arm.elf
Resource
debian9-armhf-20240611-en
Malware Config
Extracted
mirai
LZRD
Targets
-
-
Target
loligang.arm.elf
-
Size
80KB
-
MD5
8041a12e2093f22364b4576f59baa53a
-
SHA1
2005d320eb32a94e66359a4c614548ccb8841800
-
SHA256
2b706e649f14f65d18e6c83a2de37568de173cccf071c07a8c6de9f346673c13
-
SHA512
e1c8f86aaed766a6750a279f152efa161d35a9fddd4a4dc9f756b7993e367d0813f5df36d5732bbe75fc9b533d91e8c168e6ec7129b8cdf2b82f253b2d6cbb3c
-
SSDEEP
1536:UeQqvm1T9mgitxIdXSYF27hJFhY49+dxRGwa/JeZWbLZprtjYqR5M:UeQ6maUGwaxwOLZppcqRG
Score9/10-
Contacts a large (20081) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Enumerates running processes
Discovers information about currently running processes on the system
-