General
-
Target
splarm7.elf
-
Size
78KB
-
Sample
250307-pf7kas1jx3
-
MD5
1dd98f27660ce0ccc01211d62fe3be21
-
SHA1
826fd3cc4bc681989fa2705950fed06d3d307acb
-
SHA256
01a9ec1c0c0fe6b18d23a3282d5388fa64477ae5cc9573644e90659b98ae9b84
-
SHA512
85112e442bd33ade4aa37e50d6518952c862762dcd48608cfac017ad61f13320eb4ea4bad3d0e6d3551355a159edf8b7e88fa70912f9fd1b0076c0141d365dde
-
SSDEEP
1536:vlBnAdZrtZouhs8WvWH04odDp9R4KB7fpLF2LgJ9hdiivQ/dlMokiba1T4m:UZ5Ze8WvWH04qDKKB7fpLFMgJ9hdiiSK
Behavioral task
behavioral1
Sample
splarm7.elf
Resource
debian9-armhf-20240611-en
Malware Config
Extracted
mirai
BOTNET
Targets
-
-
Target
splarm7.elf
-
Size
78KB
-
MD5
1dd98f27660ce0ccc01211d62fe3be21
-
SHA1
826fd3cc4bc681989fa2705950fed06d3d307acb
-
SHA256
01a9ec1c0c0fe6b18d23a3282d5388fa64477ae5cc9573644e90659b98ae9b84
-
SHA512
85112e442bd33ade4aa37e50d6518952c862762dcd48608cfac017ad61f13320eb4ea4bad3d0e6d3551355a159edf8b7e88fa70912f9fd1b0076c0141d365dde
-
SSDEEP
1536:vlBnAdZrtZouhs8WvWH04odDp9R4KB7fpLF2LgJ9hdiivQ/dlMokiba1T4m:UZ5Ze8WvWH04qDKKB7fpLFMgJ9hdiiSK
Score9/10-
Contacts a large (66559) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Renames itself
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Enumerates running processes
Discovers information about currently running processes on the system
-
Reads process memory
Read the memory of a process through the /proc virtual filesystem. This can be used to steal credentials.
-