General
-
Target
zerarm7.elf
-
Size
73KB
-
Sample
250310-akc4xswtcs
-
MD5
b03d3fdd1b0541d70bf20333bc29d6da
-
SHA1
3524cacc0f59f1764e28279e4e65ac94c63b9281
-
SHA256
a1d4783a0f02214fea4f9554f62dd48a055a8578ed7084d9486989e8d2d807cd
-
SHA512
e09fdcb7e943b7deceb815334b739d11c7c60a460b5a67e24628a8092ee7ddc5327eeff1988dab39e0bb812d6e56df39f8defa0f0fabe958f048c6fc428c17b4
-
SSDEEP
1536:/RnShVB6RcsK06pvJiYgP/rhYm1lekVuTjCdzISjM9U9lEUiqhnFsHV:oVBhsmvJirP9HjxVuTjCdzISjwohnFu
Behavioral task
behavioral1
Sample
zerarm7.elf
Resource
debian9-armhf-20240611-en
Malware Config
Extracted
mirai
BOTNET
Targets
-
-
Target
zerarm7.elf
-
Size
73KB
-
MD5
b03d3fdd1b0541d70bf20333bc29d6da
-
SHA1
3524cacc0f59f1764e28279e4e65ac94c63b9281
-
SHA256
a1d4783a0f02214fea4f9554f62dd48a055a8578ed7084d9486989e8d2d807cd
-
SHA512
e09fdcb7e943b7deceb815334b739d11c7c60a460b5a67e24628a8092ee7ddc5327eeff1988dab39e0bb812d6e56df39f8defa0f0fabe958f048c6fc428c17b4
-
SSDEEP
1536:/RnShVB6RcsK06pvJiYgP/rhYm1lekVuTjCdzISjM9U9lEUiqhnFsHV:oVBhsmvJirP9HjxVuTjCdzISjwohnFu
Score7/10-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Renames itself
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Enumerates running processes
Discovers information about currently running processes on the system
-