Analysis
-
max time kernel
2s -
max time network
124s -
platform
linux_armhf -
resource
debian9-armhf-en-20211208 -
resource tags
arch:armhfimage:debian9-armhf-en-20211208kernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem -
submitted
26-04-2023 08:57
General
-
Target
dd0248fcbf048cd8d9cc611c72d930c6.elf
-
Size
26KB
-
MD5
dd0248fcbf048cd8d9cc611c72d930c6
-
SHA1
bd7a8137b1e9742fecf0b6e40415f99bc75ef46e
-
SHA256
55a12615f9a3623560f0487c9edf30fee3ec6e7b8bb289745b8534f0512afc55
-
SHA512
32d9a144cda0b4749ffbccadaf7ce2921f0481141017f1d4d4b3fb442572eb8a3c81705228250cc83046b3d6501afde7e9b4748134d57cc1d4adde95bab54672
-
SSDEEP
768:JMKyhegCCMqfizjoNpd2vJdX6vwr99q3UELui:OKy4qfqoeJdXWgQLj
Malware Config
Extracted
Family
mirai
Botnet
LZRD
Signatures
-
Reads runtime system information 1 IoCs
Reads data from /proc virtual filesystem.
Processes:
dd0248fcbf048cd8d9cc611c72d930c6.elfdescription ioc process File opened for reading /proc/self/exe dd0248fcbf048cd8d9cc611c72d930c6.elf
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/367-1-0x00008000-0x000228c4-memory.dmp