General
-
Target
4f1ab0732c7d4700af91b44fd6e26a49f2b27f0039dbb3d9dce4f8cbf1cd1484.elf
-
Size
63KB
-
Sample
250202-ev1p7avmhx
-
MD5
44a0a590a97dc92588fa30a3d3ee011f
-
SHA1
879a7d609c539cd9f147737207d4b3422d0cbd06
-
SHA256
4f1ab0732c7d4700af91b44fd6e26a49f2b27f0039dbb3d9dce4f8cbf1cd1484
-
SHA512
bd37fa60811eff40b1a44b7cee73a7896837ea156fb7df5710d67784595a34a0b0dd3800f6595d2f868aefe76a28b25cb3155f655fffb93345d6c61593017531
-
SSDEEP
1536:MAiCDwpTQqeHYSE3gp3LirgSkxNhYu0mv:wCDyTQ34iEgvDYTmv
Behavioral task
behavioral1
Sample
4f1ab0732c7d4700af91b44fd6e26a49f2b27f0039dbb3d9dce4f8cbf1cd1484.elf
Resource
debian9-mipsbe-20240729-en
Malware Config
Targets
-
-
Target
4f1ab0732c7d4700af91b44fd6e26a49f2b27f0039dbb3d9dce4f8cbf1cd1484.elf
-
Size
63KB
-
MD5
44a0a590a97dc92588fa30a3d3ee011f
-
SHA1
879a7d609c539cd9f147737207d4b3422d0cbd06
-
SHA256
4f1ab0732c7d4700af91b44fd6e26a49f2b27f0039dbb3d9dce4f8cbf1cd1484
-
SHA512
bd37fa60811eff40b1a44b7cee73a7896837ea156fb7df5710d67784595a34a0b0dd3800f6595d2f868aefe76a28b25cb3155f655fffb93345d6c61593017531
-
SSDEEP
1536:MAiCDwpTQqeHYSE3gp3LirgSkxNhYu0mv:wCDyTQ34iEgvDYTmv
Score9/10-
Contacts a large (110946) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Deletes itself
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Renames itself
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-