General
-
Target
arm7.elf
-
Size
140KB
-
Sample
250323-dcr5na1ps2
-
MD5
a4f6cf4e6edb03734e3fd5d250dfa63b
-
SHA1
1297b2b89a27d8c3615548099cd38cbab48dc406
-
SHA256
5cc8e494a701a2f510cff13ec26bc59ef4c8f0812685a1ff7752a1c613f52f31
-
SHA512
5e1828b4cf29b04a553895af4299a46d83de01f59142737b1a66d121047404636d7c38b4052319fc6c5d5be100af82d7c9c54f4c41f5aa80bc3d423e70e8eb78
-
SSDEEP
3072:KTg0ts0CbhXBazV4WLZIdiv9cBBXB45M/9t1Ng:WruVbZBazV4W9IYOBXBaM/9tE
Behavioral task
behavioral1
Sample
arm7.elf
Resource
debian9-armhf-20240611-en
Malware Config
Extracted
mirai
WICKED
Targets
-
-
Target
arm7.elf
-
Size
140KB
-
MD5
a4f6cf4e6edb03734e3fd5d250dfa63b
-
SHA1
1297b2b89a27d8c3615548099cd38cbab48dc406
-
SHA256
5cc8e494a701a2f510cff13ec26bc59ef4c8f0812685a1ff7752a1c613f52f31
-
SHA512
5e1828b4cf29b04a553895af4299a46d83de01f59142737b1a66d121047404636d7c38b4052319fc6c5d5be100af82d7c9c54f4c41f5aa80bc3d423e70e8eb78
-
SSDEEP
3072:KTg0ts0CbhXBazV4WLZIdiv9cBBXB45M/9t1Ng:WruVbZBazV4W9IYOBXBaM/9tE
Score7/10-
Modifies Watchdog functionality
Malware like Mirai modifies the Watchdog to prevent it restarting an infected system.
-
Enumerates running processes
Discovers information about currently running processes on the system
-
Reads process memory
Read the memory of a process through the /proc virtual filesystem. This can be used to steal credentials.
-