Analysis

  • max time kernel
    1s
  • max time network
    124s
  • platform
    linux_armhf
  • resource
    debian9-armhf-en-20211208
  • resource tags

    arch:armhfimage:debian9-armhf-en-20211208kernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    26-04-2023 07:01

General

  • Target

    c562429aec46f945ac9dbe7cdcf40ff2.elf

  • Size

    32KB

  • MD5

    c562429aec46f945ac9dbe7cdcf40ff2

  • SHA1

    d7928a478e0044343b52c51590dd1de3602992b7

  • SHA256

    0b4ef31d1510e15061c56a19e9ddcf0ed7bc2fa4a797c8e334cf8bbc49eb6e5b

  • SHA512

    05b613127cf444c46123472a7cee91810f715da0c37b5de01e65c8e84ecd685fa530eabba1c53d0f15cb9cab6eb7e5301087c404873b345c453599d8d547158a

  • SSDEEP

    768:3lFtCA/Q0QbiypDWs7X6dp8PYTeDQYEvU4a2vY9q3UELS8:U0nyx3X6dp8w6fn2vBLr

Score
10/10

Malware Config

Extracted

Family

mirai

C2

bn.vboot.pw

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Reads runtime system information 1 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/c562429aec46f945ac9dbe7cdcf40ff2.elf
    /tmp/c562429aec46f945ac9dbe7cdcf40ff2.elf
    1⤵
    • Reads runtime system information
    PID:367

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/367-1-0x00008000-0x0002f8d0-memory.dmp