Analysis
-
max time kernel
1s -
max time network
126s -
platform
debian-9_armhf -
resource
debian9-armhf-20221111-en -
resource tags
arch:armhfimage:debian9-armhf-20221111-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem -
submitted
01-05-2023 02:02
General
-
Target
713ef7f67bf15c3266a405cfd08e4619d37d82db5cc3051eb9301b8cf637daff.elf
-
Size
31KB
-
MD5
adc652d883c402310b258c4674938e27
-
SHA1
12bb27f64c941fde7c5b700e5831ee3f40d7dc00
-
SHA256
713ef7f67bf15c3266a405cfd08e4619d37d82db5cc3051eb9301b8cf637daff
-
SHA512
c90664719c973c7b75b97ae3f71914b4c4af4abc8398832c04e3faa44d51cb3b57d6988d1e20001653cac42e80c2d6fe5132bdfdedfd1f8ed2c785c18c94fd93
-
SSDEEP
768:rEKkUgXAnURCr6HmDFStmYt869q3UELde:nkEn7uHEemZvLM
Malware Config
Extracted
Family
mirai
Botnet
SORA
Signatures
-
Reads runtime system information 1 IoCs
Reads data from /proc virtual filesystem.
Processes:
713ef7f67bf15c3266a405cfd08e4619d37d82db5cc3051eb9301b8cf637daff.elfdescription ioc process File opened for reading /proc/self/exe 713ef7f67bf15c3266a405cfd08e4619d37d82db5cc3051eb9301b8cf637daff.elf