Analysis
-
max time kernel
1s -
max time network
124s -
platform
linux_armhf -
resource
debian9-armhf-en-20211208 -
resource tags
arch:armhfimage:debian9-armhf-en-20211208kernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem -
submitted
03-06-2023 08:54
General
-
Target
4744732e620ff70fd756c39b2643b4b3.elf
-
Size
59KB
-
MD5
4744732e620ff70fd756c39b2643b4b3
-
SHA1
4cc5b69e5d0182cc922fe3e01158bb3754eb4fdc
-
SHA256
0a3cc1c7d81fd0bc63101d121c0518d32a42253453985565525a4896b8e8d144
-
SHA512
0152e661a1e2346d8440e7f71b942d00adcc5e220f138bd38e4dca0af3bba8657d833c0944dae8077b70eb251de0ad8ec2ef7b22de017ce6248e7dfee28602c3
-
SSDEEP
1536:bJ5iXW5B0w9p2uwhnPd/VEeTcFZWU+Mj7AdTiPYst:9YG81Pdt7oZWU+cMTwf
Malware Config
Extracted
Family
mirai
Botnet
YAKUZA
Signatures
-
Deletes itself 1 IoCs
Processes:
4744732e620ff70fd756c39b2643b4b3.elfpid process 355 4744732e620ff70fd756c39b2643b4b3.elf -
Reads runtime system information 1 IoCs
Reads data from /proc virtual filesystem.
Processes:
4744732e620ff70fd756c39b2643b4b3.elfdescription ioc process File opened for reading /proc/self/exe 4744732e620ff70fd756c39b2643b4b3.elf