Analysis

  • max time kernel
    1s
  • max time network
    124s
  • platform
    linux_armhf
  • resource
    debian9-armhf-en-20211208
  • resource tags

    arch:armhfimage:debian9-armhf-en-20211208kernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    04-05-2023 15:49

General

  • Target

    cd8b9b7a57c9cd15c6dd8683febdf8b8.elf

  • Size

    38KB

  • MD5

    cd8b9b7a57c9cd15c6dd8683febdf8b8

  • SHA1

    427474997a21874533e2275a776a37fa8808a291

  • SHA256

    39072d904aa9a0acc3f8fb0f30a02af1999e27bd14a4ccfab5a4a59b1527a865

  • SHA512

    3479f58e49065888c25f89099f054378d490537565fad5fc247bf061f0b59db22b8baec9a4ec6fd6642fed3ed28bbd5054cd3314ec37fad091676317d22766b7

  • SSDEEP

    768:5lExwAF95suoKlIiA0tKDBmcOB1uzy57QJs824trkM+7n/PYGggq3UIA7Q:5ybdspKC39D2B8+5RDY+7g3gQ

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

UNSTABLE

C2

ensurex.riches.homes

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Reads runtime system information 1 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/cd8b9b7a57c9cd15c6dd8683febdf8b8.elf
    /tmp/cd8b9b7a57c9cd15c6dd8683febdf8b8.elf
    1⤵
    • Reads runtime system information
    PID:367

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/367-1-0x00008000-0x00031a8c-memory.dmp