Analysis

  • max time kernel
    143s
  • max time network
    150s
  • platform
    linux_amd64
  • resource
    ubuntu1804-amd64-en-20211208
  • resource tags

    arch:amd64arch:i386image:ubuntu1804-amd64-en-20211208kernel:4.15.0-161-genericlocale:en-usos:ubuntu-18.04-amd64system
  • submitted
    08/06/2023, 05:33

General

  • Target

    x86.elf

  • Size

    17KB

  • MD5

    5901d4e3307a860d09829316e5f55f11

  • SHA1

    918b7a8bb5fbd6a748e2b5d89f3cfd01948c1324

  • SHA256

    5a43283ed78f175f8a4b57b77d6ff9388ba58913ffa94183692b5f31bcaaf193

  • SHA512

    934bde6f6e4f8570eba1fc4118bbd781be44acc08af21d1c62643069796f7af47b6e9b788d9b13dbded21b3d70ac29f082f06d71cf944195d141f3471387d279

  • SSDEEP

    384:MGjaGgsMNJ/pS+XqfHQE/V+HHtNiBYcNd9rV9I0SWIDKd5:bMNJ/lXoHHPBZd9rzCWeKd5

Score
10/10

Malware Config

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Changes its process name 1 IoCs
  • Enumerates running processes

    Discovers information about currently running processes on the system

  • Reads runtime system information 64 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/x86.elf
    /tmp/x86.elf
    1⤵
    • Changes its process name
    PID:575

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads