Analysis
-
max time kernel
2s -
max time network
126s -
platform
linux_armhf -
resource
debian9-armhf-en-20211208 -
resource tags
arch:armhfimage:debian9-armhf-en-20211208kernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem -
submitted
30-05-2023 06:33
General
-
Target
0029d90a99baf7dc773ec579fe47e39c.elf
-
Size
53KB
-
MD5
0029d90a99baf7dc773ec579fe47e39c
-
SHA1
821fe3455aa6d7624df44d61129197c8cb9bb861
-
SHA256
809c8bafc1e07789a6487ac4e5274df8b4f0af68a85c780076114c7dc178a658
-
SHA512
b06521a8882abc49cf75bd37ff622158aa1f53afe74750400e4fadeb007c23430e37c6ebe036d46c03cb5596b852e2f3b059238dce2e784e207d81678442cbea
-
SSDEEP
1536:MfWgzCFNlSEfsGdCX/NMkPsVtrELR9NQp6WZ7PhOMA3Ax:Mf+D0GdCPNotrELRM6GYfQx
Malware Config
Extracted
Family
mirai
Botnet
SORA
Signatures
-
Reads runtime system information 1 IoCs
Reads data from /proc virtual filesystem.
Processes:
0029d90a99baf7dc773ec579fe47e39c.elfdescription ioc process File opened for reading /proc/self/exe 0029d90a99baf7dc773ec579fe47e39c.elf
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/351-1-0x00008000-0x0002c628-memory.dmp