Analysis

  • max time kernel
    1s
  • max time network
    127s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20221111-en
  • resource tags

    arch:armhfimage:debian9-armhf-20221111-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    15/05/2023, 01:00

General

  • Target

    e1e760c5150921f05fe20b07f10a5e773d075be67ed0314995c939f7adeca1af.elf

  • Size

    27KB

  • MD5

    0c325fb5cead1375ec048a255082974c

  • SHA1

    01ccad68c5fbd00bdb9358b3ba46d73df9775df1

  • SHA256

    e1e760c5150921f05fe20b07f10a5e773d075be67ed0314995c939f7adeca1af

  • SHA512

    e3274da83ea89f99f86906fe61bac3f7f30627017692b238f77074e01e23c74b6b696515d3aebf849981297c02c573b116c1e7d3bdb16bab3ab890ddc0eb9a1c

  • SSDEEP

    768:xOpz26jUR++6YvaEjSp2N/KGKtFg5b9q3UELd4:xbR93/N/KG6g56Ly

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

SORA

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Reads runtime system information 1 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/e1e760c5150921f05fe20b07f10a5e773d075be67ed0314995c939f7adeca1af.elf
    /tmp/e1e760c5150921f05fe20b07f10a5e773d075be67ed0314995c939f7adeca1af.elf
    1⤵
    • Reads runtime system information
    PID:353

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads