Analysis

  • max time kernel
    2s
  • max time network
    127s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20221125-en
  • resource tags

    arch:armhfimage:debian9-armhf-20221125-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    02-06-2023 08:12

General

  • Target

    757773e323e03ccc1d2e3200541f9312.elf

  • Size

    32KB

  • MD5

    757773e323e03ccc1d2e3200541f9312

  • SHA1

    2d5d3f58f4194ffd78b0b4eb79efc2a7c23de2cd

  • SHA256

    d685223245dba931570e8313451d9bfb49c7c537eb1e47ca6cfd8483ae32b4d8

  • SHA512

    13ebaed7f2f88535bcc35e4512fda088737422605dbbc52f5da01adcdeb80060331cf63d70a9cdc477e602386e63b8798940c50f9d56524349599259b391db93

  • SSDEEP

    768:PoiWiO031vpAPbrVWZK3XVGxm9X+I9q3UEL5Ij:Porm1vpALgUJ+xLo

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

SORA

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Reads runtime system information 1 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/757773e323e03ccc1d2e3200541f9312.elf
    /tmp/757773e323e03ccc1d2e3200541f9312.elf
    1⤵
    • Reads runtime system information
    PID:354

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/354-1-0x00008000-0x0002db18-memory.dmp