General
-
Target
boatnet.arm7.elf
-
Size
53KB
-
Sample
250209-tyrc9awnfr
-
MD5
6edeb7febaae705409d3429731970a2b
-
SHA1
ddafc2a466768c8b236a224e19038ced4b218c1f
-
SHA256
4fd7ea8cfecb7fa30a6d6637f6d874ac94ab60352d326a8af68164d9900101c7
-
SHA512
31715bfddea2a892eae936d1df6249a7b051392477f13ad3238b3f4ecf8111c3dc6926d210afc93a5d88d2d63505b15f3a21c778686fb3213080a4440ab26023
-
SSDEEP
768:/GJrriWrm5118Y+4xTuNqAcpPUQVvaLy9eu/bcpQhsNe6oN9t9q3UELaLaMe25RZ:/GripJhhxeRpBoELwOLm
Behavioral task
behavioral1
Sample
boatnet.arm7.elf
Resource
debian9-armhf-20240418-en
Malware Config
Extracted
mirai
LZRD
Targets
-
-
Target
boatnet.arm7.elf
-
Size
53KB
-
MD5
6edeb7febaae705409d3429731970a2b
-
SHA1
ddafc2a466768c8b236a224e19038ced4b218c1f
-
SHA256
4fd7ea8cfecb7fa30a6d6637f6d874ac94ab60352d326a8af68164d9900101c7
-
SHA512
31715bfddea2a892eae936d1df6249a7b051392477f13ad3238b3f4ecf8111c3dc6926d210afc93a5d88d2d63505b15f3a21c778686fb3213080a4440ab26023
-
SSDEEP
768:/GJrriWrm5118Y+4xTuNqAcpPUQVvaLy9eu/bcpQhsNe6oN9t9q3UELaLaMe25RZ:/GripJhhxeRpBoELwOLm
Score10/10-
Mirai family
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Enumerates running processes
Discovers information about currently running processes on the system
-
Writes file to system bin folder
-