Analysis
-
max time kernel
1s -
max time network
127s -
platform
debian-9_armhf -
resource
debian9-armhf-20221111-en -
resource tags
arch:armhfimage:debian9-armhf-20221111-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem -
submitted
30-04-2023 08:06
General
-
Target
85dbaf4ea1234cfd4376f6075fd4028c
-
Size
57KB
-
MD5
85dbaf4ea1234cfd4376f6075fd4028c
-
SHA1
278b8b59d39e70694ff1d82fc2891aa02997fe08
-
SHA256
49fa79a0e73c2076794e752ae6b9ee5ccf0392bb20a9a0abf03f6dde394ad311
-
SHA512
08b7f03e972137797586f9c6bb74ab3eac2ae56dadfa110d6b5d48445ce1d3c68722719595e271dd26cc94eb3f902e60fe8bfc7705beb476133f77958c1374c1
-
SSDEEP
1536:Op7vD4wCrktmZFYmt9zjVmloF8FDcM9Ec2L49B60Bzwwg/:Op77OktQJ3zjV0FD9/9B6ixi
Malware Config
Extracted
Family
mirai
Botnet
MIRAI
Signatures
-
Reads runtime system information 1 IoCs
Reads data from /proc virtual filesystem.
Processes:
85dbaf4ea1234cfd4376f6075fd4028cdescription ioc process File opened for reading /proc/self/exe 85dbaf4ea1234cfd4376f6075fd4028c
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/357-1-0x00008000-0x00029424-memory.dmp