General
-
Target
b4a76304e773db307c2f73543addf7d06d7365aba87d84d1a69657ae7790a3c7.elf
-
Size
90KB
-
Sample
250307-g2mg9avybs
-
MD5
98898ddd2ea26ec2d37f0a02c8315f4a
-
SHA1
f491994473acb3c6c755be10fd7bc948c1b6e773
-
SHA256
b4a76304e773db307c2f73543addf7d06d7365aba87d84d1a69657ae7790a3c7
-
SHA512
4bdfe4eda521a7bcf33668679a642b17351d63b2c1c47f9644be737ad3483a0a40e3cf7d061ab522b5ac7306180cd96381d27510046acaf0ede096e88395f7c6
-
SSDEEP
1536:2hG+9sUX9ZBLftw+TKp6/qL+KyBJkMFlRgl+o5ZS4Hi:iG+9sUX9fftj+p6HC5
Behavioral task
behavioral1
Sample
b4a76304e773db307c2f73543addf7d06d7365aba87d84d1a69657ae7790a3c7.elf
Resource
debian9-mipsel-20240226-en
Malware Config
Targets
-
-
Target
b4a76304e773db307c2f73543addf7d06d7365aba87d84d1a69657ae7790a3c7.elf
-
Size
90KB
-
MD5
98898ddd2ea26ec2d37f0a02c8315f4a
-
SHA1
f491994473acb3c6c755be10fd7bc948c1b6e773
-
SHA256
b4a76304e773db307c2f73543addf7d06d7365aba87d84d1a69657ae7790a3c7
-
SHA512
4bdfe4eda521a7bcf33668679a642b17351d63b2c1c47f9644be737ad3483a0a40e3cf7d061ab522b5ac7306180cd96381d27510046acaf0ede096e88395f7c6
-
SSDEEP
1536:2hG+9sUX9ZBLftw+TKp6/qL+KyBJkMFlRgl+o5ZS4Hi:iG+9sUX9fftj+p6HC5
Score9/10-
Contacts a large (23833) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Reads process memory
Read the memory of a process through the /proc virtual filesystem. This can be used to steal credentials.
-