General
-
Target
wind.arm.elf
-
Size
25KB
-
Sample
250102-197ypsxqev
-
MD5
d72a530e0c39154ca967c0a5eefcc436
-
SHA1
7850a1a4ee4235393dfd4b60b85e247291cdffe4
-
SHA256
329c3a5d8bfb865d1317176419627044cfced32be9704f1f878fc805fe0d15b0
-
SHA512
c02f074c421ffd26b7537726d7f5426076c333da7e98510c7ba87660079994e7bef16a5629b51232799bb26c371b505f0c607ac099eb3b8c5cb08f4c90b1a798
-
SSDEEP
768:WbrQ9NZTs+lQFej5Xu4+rHJrBprs3UozVG:WY9NZoxuuRBwzw
Behavioral task
behavioral1
Sample
wind.arm.elf
Resource
debian9-armhf-20240729-en
Malware Config
Extracted
mirai
LZRD
Targets
-
-
Target
wind.arm.elf
-
Size
25KB
-
MD5
d72a530e0c39154ca967c0a5eefcc436
-
SHA1
7850a1a4ee4235393dfd4b60b85e247291cdffe4
-
SHA256
329c3a5d8bfb865d1317176419627044cfced32be9704f1f878fc805fe0d15b0
-
SHA512
c02f074c421ffd26b7537726d7f5426076c333da7e98510c7ba87660079994e7bef16a5629b51232799bb26c371b505f0c607ac099eb3b8c5cb08f4c90b1a798
-
SSDEEP
768:WbrQ9NZTs+lQFej5Xu4+rHJrBprs3UozVG:WY9NZoxuuRBwzw
Score10/10-
Mirai family
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Enumerates running processes
Discovers information about currently running processes on the system
-
Writes file to system bin folder
-