Analysis

  • max time kernel
    2s
  • max time network
    126s
  • platform
    linux_armhf
  • resource
    debian9-armhf-en-20211208
  • resource tags

    arch:armhfimage:debian9-armhf-en-20211208kernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    29-05-2023 16:19

General

  • Target

    c1d1f26c054611066aa463f0c1399a44.elf

  • Size

    28KB

  • MD5

    c1d1f26c054611066aa463f0c1399a44

  • SHA1

    ec872ed99346806a2fe467662365ac737e733137

  • SHA256

    6b4d621c858e202d077475ac41720593832b84896b470a6e96f90d6c811ca7ee

  • SHA512

    da2f40418c50cb6c33caf4ad1abd40a4702e381affdbe389011d9afe2c1542e77a6e75d2c750d78ebdccbb1d11d177c30f5ddee2b202f175f391a429fd6f6221

  • SSDEEP

    768:vusHfRavjynNKnjFcZIhQzhKMXg7o9q3UEL7d:HRwynNIOQQ1KMw7RLh

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

SORA

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Reads runtime system information 1 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/c1d1f26c054611066aa463f0c1399a44.elf
    /tmp/c1d1f26c054611066aa463f0c1399a44.elf
    1⤵
    • Reads runtime system information
    PID:359

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/359-1-0x00008000-0x00022780-memory.dmp