Analysis

  • max time kernel
    1s
  • max time network
    124s
  • platform
    linux_armhf
  • resource
    debian9-armhf-en-20211208
  • resource tags

    arch:armhfimage:debian9-armhf-en-20211208kernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    03-06-2023 08:54

General

  • Target

    4744732e620ff70fd756c39b2643b4b3.elf

  • Size

    59KB

  • MD5

    4744732e620ff70fd756c39b2643b4b3

  • SHA1

    4cc5b69e5d0182cc922fe3e01158bb3754eb4fdc

  • SHA256

    0a3cc1c7d81fd0bc63101d121c0518d32a42253453985565525a4896b8e8d144

  • SHA512

    0152e661a1e2346d8440e7f71b942d00adcc5e220f138bd38e4dca0af3bba8657d833c0944dae8077b70eb251de0ad8ec2ef7b22de017ce6248e7dfee28602c3

  • SSDEEP

    1536:bJ5iXW5B0w9p2uwhnPd/VEeTcFZWU+Mj7AdTiPYst:9YG81Pdt7oZWU+cMTwf

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

YAKUZA

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Deletes itself 1 IoCs
  • Reads runtime system information 1 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/4744732e620ff70fd756c39b2643b4b3.elf
    /tmp/4744732e620ff70fd756c39b2643b4b3.elf
    1⤵
    • Deletes itself
    • Reads runtime system information
    PID:355

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/355-1-0x00008000-0x0002c238-memory.dmp