General
-
Target
arm7.elf
-
Size
77KB
-
Sample
250210-1q673aznax
-
MD5
82feacfdba7096dd1f30ae81b443ed99
-
SHA1
1ffc5f931d6bbf76e3ae065033fc5cb95a9e8a33
-
SHA256
dec770c2901a222ec48915adfe1f7c6091fc3e9b03941a53f44b21593af862d2
-
SHA512
07f59c67b2c32911d031816713ad9bcd36f2b3beaf9c7645c1d3b73fc29fb2d09aef648a08fd6f83037bf3731d287babcfc7c228fac7af465bc79ad325477c9d
-
SSDEEP
1536:Zxn7gLqXIQHj0jLwdeEyQqF1s4/BSc9Zg9ZUzMVy9r2UQZdljuit+AG2:kLgIZjLqeECn/BSyIWzMVy9r2Nd+AB
Behavioral task
behavioral1
Sample
arm7.elf
Resource
debian9-armhf-20240418-en
Malware Config
Extracted
mirai
BOTNET
Targets
-
-
Target
arm7.elf
-
Size
77KB
-
MD5
82feacfdba7096dd1f30ae81b443ed99
-
SHA1
1ffc5f931d6bbf76e3ae065033fc5cb95a9e8a33
-
SHA256
dec770c2901a222ec48915adfe1f7c6091fc3e9b03941a53f44b21593af862d2
-
SHA512
07f59c67b2c32911d031816713ad9bcd36f2b3beaf9c7645c1d3b73fc29fb2d09aef648a08fd6f83037bf3731d287babcfc7c228fac7af465bc79ad325477c9d
-
SSDEEP
1536:Zxn7gLqXIQHj0jLwdeEyQqF1s4/BSc9Zg9ZUzMVy9r2UQZdljuit+AG2:kLgIZjLqeECn/BSyIWzMVy9r2Nd+AB
Score9/10-
Contacts a large (183668) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Deletes itself
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Renames itself
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Enumerates running processes
Discovers information about currently running processes on the system
-
Reads process memory
Read the memory of a process through the /proc virtual filesystem. This can be used to steal credentials.
-