Analysis
-
max time kernel
1s -
max time network
127s -
platform
debian-9_armhf -
resource
debian9-armhf-20221111-en -
resource tags
arch:armhfimage:debian9-armhf-20221111-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem -
submitted
01-05-2023 02:30
General
-
Target
4a81ce0f9509209d165ced40e60e7d0a660ec802675cfff1906b375cd2119bbc.elf
-
Size
50KB
-
MD5
f2e5e013f88099c9762b7ae92e7f2261
-
SHA1
95763e4a1bcf6516b453bdf252c8ca6bd3da1376
-
SHA256
4a81ce0f9509209d165ced40e60e7d0a660ec802675cfff1906b375cd2119bbc
-
SHA512
d7d7562cda0fdd47c0c4de6d456c11e086c030206f0beb6d7b45a30dc2c8f0319f549b5630f1a72cacdb3abc695eb971820b6bd64ea384c909845c66bb0a780a
-
SSDEEP
1536:3CoqsGR4eB3g0Vmh1IxIpC8JzL9VE8amFZP7R3X:Soqs2Twh6P8JzLJ9ZP7R3X
Malware Config
Extracted
Family
mirai
Botnet
SORA
Signatures
-
Reads runtime system information 1 IoCs
Reads data from /proc virtual filesystem.
Processes:
4a81ce0f9509209d165ced40e60e7d0a660ec802675cfff1906b375cd2119bbc.elfdescription ioc process File opened for reading /proc/self/exe 4a81ce0f9509209d165ced40e60e7d0a660ec802675cfff1906b375cd2119bbc.elf