General
-
Target
loligang.x86.elf
-
Size
72KB
-
Sample
250101-vctf6atjf1
-
MD5
3421bc39e53ed5a6d117d95ae47f18a4
-
SHA1
782c8e660ecffd312bfce16a945898b9c0878ddd
-
SHA256
2a579810e77e2c8577231c5503b6e890b47d551b84161cde8adebf901098608b
-
SHA512
52204581fcae100145071aa555dbe87090cca231eadd77ff9707d411a681f0ebddd6190805d62741904f9333455b677d42d9975b0e65496d8b82c15b1d9f6111
-
SSDEEP
1536:6gFjEj7/+hCa5Zk8O2DRuYX619DM1zcJhxoVmSW4OB/BQJv4rmoBitQOVG:zE3/+hCa5ZzO2DRuYX61FMSxbSW3/GhW
Behavioral task
behavioral1
Sample
loligang.x86.elf
Resource
ubuntu2204-amd64-20240611-en
Malware Config
Extracted
mirai
LZRD
Targets
-
-
Target
loligang.x86.elf
-
Size
72KB
-
MD5
3421bc39e53ed5a6d117d95ae47f18a4
-
SHA1
782c8e660ecffd312bfce16a945898b9c0878ddd
-
SHA256
2a579810e77e2c8577231c5503b6e890b47d551b84161cde8adebf901098608b
-
SHA512
52204581fcae100145071aa555dbe87090cca231eadd77ff9707d411a681f0ebddd6190805d62741904f9333455b677d42d9975b0e65496d8b82c15b1d9f6111
-
SSDEEP
1536:6gFjEj7/+hCa5Zk8O2DRuYX619DM1zcJhxoVmSW4OB/BQJv4rmoBitQOVG:zE3/+hCa5ZzO2DRuYX61FMSxbSW3/GhW
Score9/10-
Contacts a large (19326) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Enumerates running processes
Discovers information about currently running processes on the system
-