General
-
Target
splarm7
-
Size
78KB
-
Sample
250310-ldvaeazxe1
-
MD5
6a8f6988bacce16ff9d10a50cb1bb755
-
SHA1
40884b7069958a7470ef20787441ae3d64c4f7e6
-
SHA256
8312daded7f34a6803e7ed28ad921c93020cb2c865d669bb4a528e7a9c94ee01
-
SHA512
18e1353023e9bf227e082571a46d883d5866db612b79e3ec8bad0d3e09fd804522ef7394b1fadd29f2f4ef78eeb0552c80e5e5c4c1867e7defd6e8221b1b8ae9
-
SSDEEP
1536:VunCWUjvYh2/xB0ZD9S+Yrgoj8w4zvKsvKfhfV5VKKMQ+dlU8iPCW15:QgAhM0ZD9S+YUoezvKsvQhfV5VKKnlCK
Behavioral task
behavioral1
Sample
splarm7
Resource
debian9-armhf-20240611-en
Malware Config
Extracted
mirai
BOTNET
Targets
-
-
Target
splarm7
-
Size
78KB
-
MD5
6a8f6988bacce16ff9d10a50cb1bb755
-
SHA1
40884b7069958a7470ef20787441ae3d64c4f7e6
-
SHA256
8312daded7f34a6803e7ed28ad921c93020cb2c865d669bb4a528e7a9c94ee01
-
SHA512
18e1353023e9bf227e082571a46d883d5866db612b79e3ec8bad0d3e09fd804522ef7394b1fadd29f2f4ef78eeb0552c80e5e5c4c1867e7defd6e8221b1b8ae9
-
SSDEEP
1536:VunCWUjvYh2/xB0ZD9S+Yrgoj8w4zvKsvKfhfV5VKKMQ+dlU8iPCW15:QgAhM0ZD9S+YUoezvKsvQhfV5VKKnlCK
Score9/10-
Contacts a large (64769) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Renames itself
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Enumerates running processes
Discovers information about currently running processes on the system
-
Reads process memory
Read the memory of a process through the /proc virtual filesystem. This can be used to steal credentials.
-