Analysis

  • max time kernel
    1s
  • max time network
    127s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20221111-en
  • resource tags

    arch:armhfimage:debian9-armhf-20221111-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    01-05-2023 02:30

General

  • Target

    4a81ce0f9509209d165ced40e60e7d0a660ec802675cfff1906b375cd2119bbc.elf

  • Size

    50KB

  • MD5

    f2e5e013f88099c9762b7ae92e7f2261

  • SHA1

    95763e4a1bcf6516b453bdf252c8ca6bd3da1376

  • SHA256

    4a81ce0f9509209d165ced40e60e7d0a660ec802675cfff1906b375cd2119bbc

  • SHA512

    d7d7562cda0fdd47c0c4de6d456c11e086c030206f0beb6d7b45a30dc2c8f0319f549b5630f1a72cacdb3abc695eb971820b6bd64ea384c909845c66bb0a780a

  • SSDEEP

    1536:3CoqsGR4eB3g0Vmh1IxIpC8JzL9VE8amFZP7R3X:Soqs2Twh6P8JzLJ9ZP7R3X

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

SORA

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Reads runtime system information 1 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/4a81ce0f9509209d165ced40e60e7d0a660ec802675cfff1906b375cd2119bbc.elf
    /tmp/4a81ce0f9509209d165ced40e60e7d0a660ec802675cfff1906b375cd2119bbc.elf
    1⤵
    • Reads runtime system information
    PID:371

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/371-1-0x00008000-0x00029730-memory.dmp