Analysis

  • max time kernel
    2s
  • max time network
    126s
  • platform
    linux_armhf
  • resource
    debian9-armhf-en-20211208
  • resource tags

    arch:armhfimage:debian9-armhf-en-20211208kernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    04-07-2023 12:54

General

  • Target

    9862cd7da588b2267cc7852faaec5cb6b4dfa395872bf15fd401fe89c4af5649.elf

  • Size

    39KB

  • MD5

    720bf0b54443519a21db26762333437e

  • SHA1

    11e764f90756f126a03b7a53ec272fcd5bfa8df2

  • SHA256

    9862cd7da588b2267cc7852faaec5cb6b4dfa395872bf15fd401fe89c4af5649

  • SHA512

    21d3cdde6264b4da55ceb9b8e81c41f6b9792971a16484fad99fe3d2bd9f206e3fea927a16ab7afbbec0c98f9b54d057fcbc7ee2d36470ea0e04ca52fe5d8b75

  • SSDEEP

    768:D36qA4/RyaDuqnal1K770uE9pi2DwKk6lkxFjMlZo9q3UELj2:D3XP8AuqnaCv0r9kJPE9VL6

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

YOWAI

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Reads runtime system information 1 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/9862cd7da588b2267cc7852faaec5cb6b4dfa395872bf15fd401fe89c4af5649.elf
    /tmp/9862cd7da588b2267cc7852faaec5cb6b4dfa395872bf15fd401fe89c4af5649.elf
    1⤵
    • Reads runtime system information
    PID:359

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads