General
-
Target
arm7.elf
-
Size
169KB
-
Sample
250309-xe9bhaxrw5
-
MD5
4cfb2e468ca26714f9245f8560199a16
-
SHA1
a2d9124d37cb49623e72eba5bef5e64163ecfb05
-
SHA256
71c530dec9d8b7ce19c08057d38821ab6e0c807d8456206434254d61c7610b24
-
SHA512
33b17a365f04a04b563b568001ab82951800f717e38deba885f8f30a550e0d0c2bafd1678f0c04360ab4feab0056fb259ba9d4aafd64d74de47f4ef9466afc42
-
SSDEEP
3072:SsdHf6qiW4Cd6JwsmVhLXphfGiaUfsKB3rYmWVaEWKQ85+LYRM/9TvgE:SsdHf6qqCd6RiXrOiaUfsKBcmAN95+Lh
Behavioral task
behavioral1
Sample
arm7.elf
Resource
debian9-armhf-20240611-en
Malware Config
Extracted
mirai
OWARI
Targets
-
-
Target
arm7.elf
-
Size
169KB
-
MD5
4cfb2e468ca26714f9245f8560199a16
-
SHA1
a2d9124d37cb49623e72eba5bef5e64163ecfb05
-
SHA256
71c530dec9d8b7ce19c08057d38821ab6e0c807d8456206434254d61c7610b24
-
SHA512
33b17a365f04a04b563b568001ab82951800f717e38deba885f8f30a550e0d0c2bafd1678f0c04360ab4feab0056fb259ba9d4aafd64d74de47f4ef9466afc42
-
SSDEEP
3072:SsdHf6qiW4Cd6JwsmVhLXphfGiaUfsKB3rYmWVaEWKQ85+LYRM/9TvgE:SsdHf6qqCd6RiXrOiaUfsKBcmAN95+Lh
Score9/10-
Contacts a large (47587) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Enumerates running processes
Discovers information about currently running processes on the system
-