General
-
Target
splmips.elf
-
Size
74KB
-
Sample
250307-n7h6cazrv6
-
MD5
0a8ce456e36af274da7d826c157dbc94
-
SHA1
568a753ecc7c9ad55446b7dbfd7e37d0d99d904c
-
SHA256
2298c478b9d60b72f02b9195483f8b5b037d4faface6a264a580e5645cb8eaf2
-
SHA512
457cb7f7a928ed280b9921631329f002f67d7743defe1bffb2f079fe06d5e7770a491074f0d0188ae323bef0b4281236d5a81ae8778a97306ed66ba5f56b3c5b
-
SSDEEP
1536:lKBKC1576Ph/OUbdaQedXdXmtlvfPKt6hO0rV:0Ic57yh/pPBvPZhOAV
Behavioral task
behavioral1
Sample
splmips.elf
Resource
debian9-mipsbe-20240418-en
Malware Config
Extracted
mirai
BOTNET
Targets
-
-
Target
splmips.elf
-
Size
74KB
-
MD5
0a8ce456e36af274da7d826c157dbc94
-
SHA1
568a753ecc7c9ad55446b7dbfd7e37d0d99d904c
-
SHA256
2298c478b9d60b72f02b9195483f8b5b037d4faface6a264a580e5645cb8eaf2
-
SHA512
457cb7f7a928ed280b9921631329f002f67d7743defe1bffb2f079fe06d5e7770a491074f0d0188ae323bef0b4281236d5a81ae8778a97306ed66ba5f56b3c5b
-
SSDEEP
1536:lKBKC1576Ph/OUbdaQedXdXmtlvfPKt6hO0rV:0Ic57yh/pPBvPZhOAV
Score9/10-
Contacts a large (66573) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Renames itself
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Enumerates running processes
Discovers information about currently running processes on the system
-
Reads process memory
Read the memory of a process through the /proc virtual filesystem. This can be used to steal credentials.
-