General
-
Target
28b0113be18b774974228663cf5708a31b9847612e2accd0f37c54f79b3bb870.elf
-
Size
140KB
-
Sample
250307-d2a8fatpv2
-
MD5
e1d0b97db4f5c8387f6bd263e9eceedd
-
SHA1
48b4781ae7fd5ed015ac4a30b78d7a5b96123994
-
SHA256
28b0113be18b774974228663cf5708a31b9847612e2accd0f37c54f79b3bb870
-
SHA512
f3bef76e3d4a7fc61746dbdd617a828e1398848728794c7ee5129332114d0a6bac8ffe05d17f09b793fd1e1bef1bfc42a695daae6699a6d20de5e306915a8958
-
SSDEEP
3072:VYbSBlR85zjsTlYqNExIUXEOavkVQ/PcazWZSM/9vP/r:abuRuzjst7UXEOavoQMazZM/9vP/r
Behavioral task
behavioral1
Sample
28b0113be18b774974228663cf5708a31b9847612e2accd0f37c54f79b3bb870.elf
Resource
debian9-armhf-20240611-en
Malware Config
Targets
-
-
Target
28b0113be18b774974228663cf5708a31b9847612e2accd0f37c54f79b3bb870.elf
-
Size
140KB
-
MD5
e1d0b97db4f5c8387f6bd263e9eceedd
-
SHA1
48b4781ae7fd5ed015ac4a30b78d7a5b96123994
-
SHA256
28b0113be18b774974228663cf5708a31b9847612e2accd0f37c54f79b3bb870
-
SHA512
f3bef76e3d4a7fc61746dbdd617a828e1398848728794c7ee5129332114d0a6bac8ffe05d17f09b793fd1e1bef1bfc42a695daae6699a6d20de5e306915a8958
-
SSDEEP
3072:VYbSBlR85zjsTlYqNExIUXEOavkVQ/PcazWZSM/9vP/r:abuRuzjst7UXEOavoQMazZM/9vP/r
Score9/10-
Contacts a large (23989) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Enumerates running processes
Discovers information about currently running processes on the system
-
Reads process memory
Read the memory of a process through the /proc virtual filesystem. This can be used to steal credentials.
-