General
-
Target
loligang.mpsl.elf
-
Size
103KB
-
Sample
250101-vctf6awlbr
-
MD5
af4c5645b671e06d6c0b3991e52f1c30
-
SHA1
9c015d6953adf0a4141b6dd465ec9097d7f4346f
-
SHA256
992249b7c0c645c1c6fdaf2ce418afbe7e1f93d7372fc6769817126a24e09177
-
SHA512
b18e37515ece867a0bd795f889bd472efaf8c3c70a6eced40dff7067439787bf41eadc274298ca97272942f16dcb2ae3130d61784fd4d848ea5a48545012cc70
-
SSDEEP
1536:T32gjpr4NEQu3p0ZwIGH5PbpTBRRtBeiZebzELlViYp:TGgjpr53pndeisgY2
Behavioral task
behavioral1
Sample
loligang.mpsl.elf
Resource
debian12-mipsel-20240221-en
Malware Config
Extracted
mirai
LZRD
Targets
-
-
Target
loligang.mpsl.elf
-
Size
103KB
-
MD5
af4c5645b671e06d6c0b3991e52f1c30
-
SHA1
9c015d6953adf0a4141b6dd465ec9097d7f4346f
-
SHA256
992249b7c0c645c1c6fdaf2ce418afbe7e1f93d7372fc6769817126a24e09177
-
SHA512
b18e37515ece867a0bd795f889bd472efaf8c3c70a6eced40dff7067439787bf41eadc274298ca97272942f16dcb2ae3130d61784fd4d848ea5a48545012cc70
-
SSDEEP
1536:T32gjpr4NEQu3p0ZwIGH5PbpTBRRtBeiZebzELlViYp:TGgjpr53pndeisgY2
Score9/10-
Contacts a large (16895) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Enumerates running processes
Discovers information about currently running processes on the system
-