General
-
Target
arm.elf
-
Size
91KB
-
Sample
250310-m47tvssk17
-
MD5
e82d2be7cc3bf861baada6f948ad2248
-
SHA1
d943ce40929436ca65b41f92a8a017c1e65a3dd8
-
SHA256
350fc7822ae13ed0400588bbfacc725f01701ebd8e6a48be34517421b18ce0aa
-
SHA512
24aff91359aa84797008cc0b9037c3c4b6710df87ed4aec0671d9954a4664618da8fd2e0d9d29592cb9eafd2fb54c1873ad8026fba812621e72784b551ffda4c
-
SSDEEP
1536:fiutfr0D0xoArDPi44bNf1XbVe+nCZoKeZW155Vxgrl3fWCIAvgQ4:fiafZIZCZLwYjnghukgQ4
Behavioral task
behavioral1
Sample
arm.elf
Resource
debian9-armhf-20240611-en
Malware Config
Extracted
mirai
OWARI
Targets
-
-
Target
arm.elf
-
Size
91KB
-
MD5
e82d2be7cc3bf861baada6f948ad2248
-
SHA1
d943ce40929436ca65b41f92a8a017c1e65a3dd8
-
SHA256
350fc7822ae13ed0400588bbfacc725f01701ebd8e6a48be34517421b18ce0aa
-
SHA512
24aff91359aa84797008cc0b9037c3c4b6710df87ed4aec0671d9954a4664618da8fd2e0d9d29592cb9eafd2fb54c1873ad8026fba812621e72784b551ffda4c
-
SSDEEP
1536:fiutfr0D0xoArDPi44bNf1XbVe+nCZoKeZW155Vxgrl3fWCIAvgQ4:fiafZIZCZLwYjnghukgQ4
Score9/10-
Contacts a large (49304) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Enumerates running processes
Discovers information about currently running processes on the system
-