Analysis

  • max time kernel
    2s
  • max time network
    124s
  • platform
    linux_armhf
  • resource
    debian9-armhf-en-20211208
  • resource tags

    arch:armhfimage:debian9-armhf-en-20211208kernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    01-05-2023 01:02

General

  • Target

    85487469b9c871fd8ef379887e6535f8200c052e61b45095f6ee4bc051454314.elf

  • Size

    51KB

  • MD5

    10cc3239b5a58fcb8e28f653f3733b6e

  • SHA1

    c00aa5bf153b42d9e81eeecb586882eb7d38535e

  • SHA256

    85487469b9c871fd8ef379887e6535f8200c052e61b45095f6ee4bc051454314

  • SHA512

    b5064384ca4e481584ec18fdcfc4b12c461fb04ca8e1a20c3a3a89035976b36a90495c03a9757bd8116125795c61a9ebb1ecd32bf907b510176664ac08a2caea

  • SSDEEP

    1536:S9O/ZMAXIxNUk0fnLcPqF1aBexo4opKZbT:S9O/ZNKyzLGqFUF+

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

SORA

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Reads runtime system information 1 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/85487469b9c871fd8ef379887e6535f8200c052e61b45095f6ee4bc051454314.elf
    /tmp/85487469b9c871fd8ef379887e6535f8200c052e61b45095f6ee4bc051454314.elf
    1⤵
    • Reads runtime system information
    PID:367

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/367-1-0x00008000-0x00029794-memory.dmp