Analysis

  • max time kernel
    1s
  • max time network
    126s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20221111-en
  • resource tags

    arch:armhfimage:debian9-armhf-20221111-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    19-05-2023 06:10

General

  • Target

    096d02ab35a608863e8b3b8d39ab4cf0.elf

  • Size

    75KB

  • MD5

    096d02ab35a608863e8b3b8d39ab4cf0

  • SHA1

    1a6e647cc01f21ff78d543942380ab78df2801c1

  • SHA256

    734d78e07719d7d6e10b2fcc11d3f4e2df158299dd8bb6f3d4bbfe62fe144507

  • SHA512

    3a3bc4fd0086fd43365dffb83ddeacf903454101305896590c73bc541ec8b0a0b71a88801a8bc5e09269831beaa0a139256ca819fdcf65382cc14b2d3f8726d3

  • SSDEEP

    1536:B9jYE6/QFVN2W2BWeu+XtXiTbfoS2G/4xGE9S4z3ex/gYYD8:ssfkWelsnx6xGEQ4z3w/2D8

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

MIRAI

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Reads runtime system information 1 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/096d02ab35a608863e8b3b8d39ab4cf0.elf
    /tmp/096d02ab35a608863e8b3b8d39ab4cf0.elf
    1⤵
    • Reads runtime system information
    PID:368

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/368-1-0x00008000-0x0002f558-memory.dmp