Analysis

  • max time kernel
    1s
  • max time network
    126s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20221111-en
  • resource tags

    arch:armhfimage:debian9-armhf-20221111-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    01-05-2023 02:02

General

  • Target

    713ef7f67bf15c3266a405cfd08e4619d37d82db5cc3051eb9301b8cf637daff.elf

  • Size

    31KB

  • MD5

    adc652d883c402310b258c4674938e27

  • SHA1

    12bb27f64c941fde7c5b700e5831ee3f40d7dc00

  • SHA256

    713ef7f67bf15c3266a405cfd08e4619d37d82db5cc3051eb9301b8cf637daff

  • SHA512

    c90664719c973c7b75b97ae3f71914b4c4af4abc8398832c04e3faa44d51cb3b57d6988d1e20001653cac42e80c2d6fe5132bdfdedfd1f8ed2c785c18c94fd93

  • SSDEEP

    768:rEKkUgXAnURCr6HmDFStmYt869q3UELde:nkEn7uHEemZvLM

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

SORA

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Reads runtime system information 1 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/713ef7f67bf15c3266a405cfd08e4619d37d82db5cc3051eb9301b8cf637daff.elf
    /tmp/713ef7f67bf15c3266a405cfd08e4619d37d82db5cc3051eb9301b8cf637daff.elf
    1⤵
    • Reads runtime system information
    PID:368

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/368-1-0x00008000-0x0002da94-memory.dmp