General
-
Target
nklarm7.elf
-
Size
73KB
-
Sample
250310-b4rbbsyscw
-
MD5
862793c87c5bc7664ee11d9ef2122a51
-
SHA1
1640fe8b76cb1d116aefa393ff64a532561d497a
-
SHA256
fd3d0b264db42129b267ec3b01a2f2a5414668ea82a17b47d621b15bc9282011
-
SHA512
ec7d0a59cc84412370dd952c74f56cbec786037ca36faae9d0cad60637b1943f7a18c51ffc51acc25581883fe67f127513bd509c83fbff2341bf545fb5f06f00
-
SSDEEP
1536:Npngq7mByGw9K09oABAKgddL/4/eLJX9woDVoK/M9J9lcki/H+ArX:EomBC9KABA9d+/eLR9woDVoK/fxH+u
Behavioral task
behavioral1
Sample
nklarm7.elf
Resource
debian9-armhf-20240611-en
Malware Config
Extracted
mirai
BOTNET
Targets
-
-
Target
nklarm7.elf
-
Size
73KB
-
MD5
862793c87c5bc7664ee11d9ef2122a51
-
SHA1
1640fe8b76cb1d116aefa393ff64a532561d497a
-
SHA256
fd3d0b264db42129b267ec3b01a2f2a5414668ea82a17b47d621b15bc9282011
-
SHA512
ec7d0a59cc84412370dd952c74f56cbec786037ca36faae9d0cad60637b1943f7a18c51ffc51acc25581883fe67f127513bd509c83fbff2341bf545fb5f06f00
-
SSDEEP
1536:Npngq7mByGw9K09oABAKgddL/4/eLJX9woDVoK/M9J9lcki/H+ArX:EomBC9KABA9d+/eLR9woDVoK/fxH+u
Score9/10-
Contacts a large (163677) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Renames itself
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Enumerates running processes
Discovers information about currently running processes on the system
-