General
-
Target
Hgf.mpsl.elf
-
Size
27KB
-
Sample
250209-l49g1svmfm
-
MD5
020582fad4f0bf2adad27f52a9552676
-
SHA1
d50a2542587a4b9dbc8adb2f5ff756352e320dd0
-
SHA256
234b54a3922b7d1d8b171aa8fc459682cb08419a4fd32799c7b689117c5c9822
-
SHA512
be9d7b812a0b70d9b63958869b36d671b9d7443de66903e0f1efedd6e974f4d1c8f4bac902c032478512847c5f455c6a00459c9799f0c254ee09ca9e7bbc35b9
-
SSDEEP
384:GsVS/zrn0BZ+ifbArLWE0uyhFx93MPmMH9h+XyHOanAvi3hbBqAtWRWGVCzhMhHD:hS/W+2bjDV0mShean+ebBNSWMIu
Behavioral task
behavioral1
Sample
Hgf.mpsl.elf
Resource
debian12-mipsel-20240221-en
Malware Config
Extracted
mirai
BOTNET
Targets
-
-
Target
Hgf.mpsl.elf
-
Size
27KB
-
MD5
020582fad4f0bf2adad27f52a9552676
-
SHA1
d50a2542587a4b9dbc8adb2f5ff756352e320dd0
-
SHA256
234b54a3922b7d1d8b171aa8fc459682cb08419a4fd32799c7b689117c5c9822
-
SHA512
be9d7b812a0b70d9b63958869b36d671b9d7443de66903e0f1efedd6e974f4d1c8f4bac902c032478512847c5f455c6a00459c9799f0c254ee09ca9e7bbc35b9
-
SSDEEP
384:GsVS/zrn0BZ+ifbArLWE0uyhFx93MPmMH9h+XyHOanAvi3hbBqAtWRWGVCzhMhHD:hS/W+2bjDV0mShean+ebBNSWMIu
Score10/10-
Mirai family
-
Contacts a large (76256) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Enumerates running processes
Discovers information about currently running processes on the system
-