Analysis

  • max time kernel
    1s
  • max time network
    127s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20221111-en
  • resource tags

    arch:armhfimage:debian9-armhf-20221111-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    03-06-2023 08:02

General

  • Target

    66a16365862196682a6967e428e9d6cb.elf

  • Size

    30KB

  • MD5

    66a16365862196682a6967e428e9d6cb

  • SHA1

    2bc23e41d34dcea44782f57311a9002bf469aca6

  • SHA256

    a5aadbfee6985066de8adfec3391eb07d46f600e093c92be34e830084b5a3aaf

  • SHA512

    c0fac1eaf2013c06919cd4ba307bcb45f83c2a300a78a88b0d9d60b73e3d9e77e867225cb41872286f98dd70923c838bc6c9bda95345b7c3db419f143cc1278e

  • SSDEEP

    768:YHOYTNpFAPfTPvAG9Ilc8Bdak2s2FwITdzu7C9q3UELaa:uNpFmLilRdatTdze3LJ

Score
10/10

Malware Config

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Reads runtime system information 1 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/66a16365862196682a6967e428e9d6cb.elf
    /tmp/66a16365862196682a6967e428e9d6cb.elf
    1⤵
    • Reads runtime system information
    PID:365

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/365-1-0x00008000-0x0002e8c8-memory.dmp