Analysis
-
max time kernel
2s -
max time network
126s -
platform
linux_armhf -
resource
debian9-armhf-en-20211208 -
resource tags
arch:armhfimage:debian9-armhf-en-20211208kernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem -
submitted
29-05-2023 16:19
General
-
Target
c1d1f26c054611066aa463f0c1399a44.elf
-
Size
28KB
-
MD5
c1d1f26c054611066aa463f0c1399a44
-
SHA1
ec872ed99346806a2fe467662365ac737e733137
-
SHA256
6b4d621c858e202d077475ac41720593832b84896b470a6e96f90d6c811ca7ee
-
SHA512
da2f40418c50cb6c33caf4ad1abd40a4702e381affdbe389011d9afe2c1542e77a6e75d2c750d78ebdccbb1d11d177c30f5ddee2b202f175f391a429fd6f6221
-
SSDEEP
768:vusHfRavjynNKnjFcZIhQzhKMXg7o9q3UEL7d:HRwynNIOQQ1KMw7RLh
Malware Config
Extracted
Family
mirai
Botnet
SORA
Signatures
-
Reads runtime system information 1 IoCs
Reads data from /proc virtual filesystem.
Processes:
c1d1f26c054611066aa463f0c1399a44.elfdescription ioc process File opened for reading /proc/self/exe c1d1f26c054611066aa463f0c1399a44.elf