Analysis

  • max time kernel
    2s
  • max time network
    126s
  • platform
    linux_armhf
  • resource
    debian9-armhf-en-20211208
  • resource tags

    arch:armhfimage:debian9-armhf-en-20211208kernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    06-05-2023 05:19

General

  • Target

    d303b744c4bd976309ec633526d5e9a5.elf

  • Size

    71KB

  • MD5

    d303b744c4bd976309ec633526d5e9a5

  • SHA1

    e2b5879472e3c07a900acb878c4871b44e82532c

  • SHA256

    1e6e240ffbbed140e528b0fb9d44ca6ca7211876e56ff658692d12d8e7c70d6f

  • SHA512

    6219f25ce3cb02b7886cf1ba785cd0d4a64b150f3d12a372493ae5981ceb8bef119b44931485ff9c2c6a92dcafd23d833411d5233cc4268cfb98e412432f1eb3

  • SSDEEP

    1536:zMNCXICDtrz9QQvYKYiIPaTWz/+W+DK27L6lXE9V2qGogwZvCMawd:QCXPDtn9QQdYiIPaq327L6lXEiogw1CU

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

MIRAI

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Reads runtime system information 1 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/d303b744c4bd976309ec633526d5e9a5.elf
    /tmp/d303b744c4bd976309ec633526d5e9a5.elf
    1⤵
    • Reads runtime system information
    PID:351

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/351-1-0x00008000-0x0002d424-memory.dmp