Analysis
-
max time kernel
2s -
max time network
126s -
platform
linux_armhf -
resource
debian9-armhf-en-20211208 -
resource tags
arch:armhfimage:debian9-armhf-en-20211208kernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem -
submitted
06-05-2023 05:19
General
-
Target
d303b744c4bd976309ec633526d5e9a5.elf
-
Size
71KB
-
MD5
d303b744c4bd976309ec633526d5e9a5
-
SHA1
e2b5879472e3c07a900acb878c4871b44e82532c
-
SHA256
1e6e240ffbbed140e528b0fb9d44ca6ca7211876e56ff658692d12d8e7c70d6f
-
SHA512
6219f25ce3cb02b7886cf1ba785cd0d4a64b150f3d12a372493ae5981ceb8bef119b44931485ff9c2c6a92dcafd23d833411d5233cc4268cfb98e412432f1eb3
-
SSDEEP
1536:zMNCXICDtrz9QQvYKYiIPaTWz/+W+DK27L6lXE9V2qGogwZvCMawd:QCXPDtn9QQdYiIPaq327L6lXEiogw1CU
Malware Config
Extracted
Family
mirai
Botnet
MIRAI
Signatures
-
Reads runtime system information 1 IoCs
Reads data from /proc virtual filesystem.
Processes:
d303b744c4bd976309ec633526d5e9a5.elfdescription ioc process File opened for reading /proc/self/exe d303b744c4bd976309ec633526d5e9a5.elf
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/351-1-0x00008000-0x0002d424-memory.dmp