Analysis

  • max time kernel
    1s
  • max time network
    105s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20221111-en
  • resource tags

    arch:armhfimage:debian9-armhf-20221111-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    02-06-2023 08:12

General

  • Target

    7dba8bd3b9ccfd72eceed47454075533.elf

  • Size

    51KB

  • MD5

    7dba8bd3b9ccfd72eceed47454075533

  • SHA1

    1efd6dcae41a7dd099a91d01321b0be922dc1066

  • SHA256

    40588210f4bf97a9d0fe6488d13e500363b9e6995948ef2a7d841d8951dea0b5

  • SHA512

    2433be42497e5d2e88f9ca6d781f0f82f9d11c04338638b15820af5d6829312a6f2ee122340676484eacb6c9b51fd7804cdb412a70aef0e9ce3ccaf0af0caf66

  • SSDEEP

    1536:69O/ZMAXIxNUk0FVFnnULcPqF1aBexo4opKZbz:69O/ZNKyRVFnULGqFUFC

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

SORA

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Reads runtime system information 1 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/7dba8bd3b9ccfd72eceed47454075533.elf
    /tmp/7dba8bd3b9ccfd72eceed47454075533.elf
    1⤵
    • Reads runtime system information
    PID:365

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/365-1-0x00008000-0x00029794-memory.dmp