Analysis

  • max time kernel
    2s
  • max time network
    124s
  • platform
    linux_armhf
  • resource
    debian9-armhf-en-20211208
  • resource tags

    arch:armhfimage:debian9-armhf-en-20211208kernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    26-04-2023 08:57

General

  • Target

    dd0248fcbf048cd8d9cc611c72d930c6.elf

  • Size

    26KB

  • MD5

    dd0248fcbf048cd8d9cc611c72d930c6

  • SHA1

    bd7a8137b1e9742fecf0b6e40415f99bc75ef46e

  • SHA256

    55a12615f9a3623560f0487c9edf30fee3ec6e7b8bb289745b8534f0512afc55

  • SHA512

    32d9a144cda0b4749ffbccadaf7ce2921f0481141017f1d4d4b3fb442572eb8a3c81705228250cc83046b3d6501afde7e9b4748134d57cc1d4adde95bab54672

  • SSDEEP

    768:JMKyhegCCMqfizjoNpd2vJdX6vwr99q3UELui:OKy4qfqoeJdXWgQLj

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Reads runtime system information 1 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/dd0248fcbf048cd8d9cc611c72d930c6.elf
    /tmp/dd0248fcbf048cd8d9cc611c72d930c6.elf
    1⤵
    • Reads runtime system information
    PID:367

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/367-1-0x00008000-0x000228c4-memory.dmp