Analysis

  • max time kernel
    146s
  • max time network
    151s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20221125-en
  • resource tags

    arch:armhfimage:debian9-armhf-20221125-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    08/06/2023, 06:13

General

  • Target

    35cad1eb36c8e59a5a2a53abfe7c4c7b.elf

  • Size

    41KB

  • MD5

    35cad1eb36c8e59a5a2a53abfe7c4c7b

  • SHA1

    d33eb9f405354eba1b4cb7ef68d72840e5740555

  • SHA256

    68e6fdf53d29d3e30169a0c87e4102e5f96a84b957e436e3dc9001e1928a82e3

  • SHA512

    407813e89d985354976f65e5bdbc3d6fe57e3db3b61c048272fbf7de014a138a3f7e7bb811296553d772c0fefc07339c828e77bf95c575741d30405b55b6e7c8

  • SSDEEP

    768:X8Ga3IWV8ELJV+/UvmtvyU8dSyVq3UInh0WBKypAR673/J:XoaEl+UvwadSyynh0WBKC73x

Score
10/10

Malware Config

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Changes its process name 1 IoCs
  • Enumerates running processes

    Discovers information about currently running processes on the system

  • Reads runtime system information 64 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/35cad1eb36c8e59a5a2a53abfe7c4c7b.elf
    /tmp/35cad1eb36c8e59a5a2a53abfe7c4c7b.elf
    1⤵
    • Changes its process name
    • Reads runtime system information
    PID:360

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads