Analysis
-
max time kernel
2s -
max time network
124s -
platform
linux_armhf -
resource
debian9-armhf-en-20211208 -
resource tags
arch:armhfimage:debian9-armhf-en-20211208kernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem -
submitted
01-05-2023 01:02
General
-
Target
85487469b9c871fd8ef379887e6535f8200c052e61b45095f6ee4bc051454314.elf
-
Size
51KB
-
MD5
10cc3239b5a58fcb8e28f653f3733b6e
-
SHA1
c00aa5bf153b42d9e81eeecb586882eb7d38535e
-
SHA256
85487469b9c871fd8ef379887e6535f8200c052e61b45095f6ee4bc051454314
-
SHA512
b5064384ca4e481584ec18fdcfc4b12c461fb04ca8e1a20c3a3a89035976b36a90495c03a9757bd8116125795c61a9ebb1ecd32bf907b510176664ac08a2caea
-
SSDEEP
1536:S9O/ZMAXIxNUk0fnLcPqF1aBexo4opKZbT:S9O/ZNKyzLGqFUF+
Malware Config
Extracted
Family
mirai
Botnet
SORA
Signatures
-
Reads runtime system information 1 IoCs
Reads data from /proc virtual filesystem.
Processes:
85487469b9c871fd8ef379887e6535f8200c052e61b45095f6ee4bc051454314.elfdescription ioc process File opened for reading /proc/self/exe 85487469b9c871fd8ef379887e6535f8200c052e61b45095f6ee4bc051454314.elf