Analysis

  • max time kernel
    1s
  • max time network
    127s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20221125-en
  • resource tags

    arch:armhfimage:debian9-armhf-20221125-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    06-08-2023 10:39

General

  • Target

    34daf5a306f9c1e300bc354b01c0fdd1.elf

  • Size

    33KB

  • MD5

    34daf5a306f9c1e300bc354b01c0fdd1

  • SHA1

    3ba939569b1e60987e16052315d9a780d5163e60

  • SHA256

    3c05fbab239c62cccf7e75c6a650620a1a51276b1665b52b59467defc9aa0cc4

  • SHA512

    9d79912169ee06598428843c7bfc9c438236dfd3173b4e8d5eb950c74b1c582c9ade26590a0a49b0c83fc7e73682f34e00da156793e159f072baccc48b6455ef

  • SSDEEP

    768:EHinV8dc5aFTFBDDJv6c3TR3SayB9q3UEL5G:oeGLFhBDDccjRiMLo

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

UNST

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Reads runtime system information 1 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/34daf5a306f9c1e300bc354b01c0fdd1.elf
    /tmp/34daf5a306f9c1e300bc354b01c0fdd1.elf
    1⤵
    • Reads runtime system information
    PID:362

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads