General
-
Target
arm.elf
-
Size
62KB
-
Sample
250201-zg3yls1ncl
-
MD5
c2f5e37fcc5fc43075d85883e0eb11e7
-
SHA1
4805a2a2e28ccdd41028c5d27bd8b0f39eba08e7
-
SHA256
d819f82d931f9e5fcff275b88c7849d737595f75f34ba60d92d68d16e68b0ea4
-
SHA512
ce79338637bdf78ad04dd93688a4f90b91933a04e1d583bf47a7bf33fe76df9b8a25f9b00d18161bfffbb9e96370214e477da8bfafdf96047bc39b8581d12c77
-
SSDEEP
1536:uGCfRTFptQ3SSYTB/s/VqaC9JaBO1Jd2:uGCfRp9TxgmJd
Behavioral task
behavioral1
Sample
arm.elf
Resource
debian9-armhf-20240611-en
Malware Config
Extracted
mirai
kurwa.barsoeb.space
Targets
-
-
Target
arm.elf
-
Size
62KB
-
MD5
c2f5e37fcc5fc43075d85883e0eb11e7
-
SHA1
4805a2a2e28ccdd41028c5d27bd8b0f39eba08e7
-
SHA256
d819f82d931f9e5fcff275b88c7849d737595f75f34ba60d92d68d16e68b0ea4
-
SHA512
ce79338637bdf78ad04dd93688a4f90b91933a04e1d583bf47a7bf33fe76df9b8a25f9b00d18161bfffbb9e96370214e477da8bfafdf96047bc39b8581d12c77
-
SSDEEP
1536:uGCfRTFptQ3SSYTB/s/VqaC9JaBO1Jd2:uGCfRp9TxgmJd
Score7/10-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Enumerates running processes
Discovers information about currently running processes on the system
-
Reads process memory
Read the memory of a process through the /proc virtual filesystem. This can be used to steal credentials.
-