Analysis

  • max time kernel
    0s
  • max time network
    125s
  • platform
    debian-9_mipsel
  • resource
    debian9-mipsel-20221125-en
  • resource tags

    arch:mipselimage:debian9-mipsel-20221125-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipselsystem
  • submitted
    21-08-2023 19:51

General

  • Target

    70689fcb460794c34c469199a1f6c85c.elf

  • Size

    26KB

  • MD5

    70689fcb460794c34c469199a1f6c85c

  • SHA1

    447ada592907b4783f2f01f3d191069326bd7a72

  • SHA256

    6bda88b582f3649abcd1b99b9bd8138b24c76124fbdc60e3bc80488b2f29eb80

  • SHA512

    762e6ed0dbb6ebfad25576da8defaaecc3016b229b71d6e248c3b171ee30b35d4f9f51645f6ffe8dfb31e3866ec0b88b822fe7876a9507fd1f0f8c226cd6e952

  • SSDEEP

    384:7qjQb+w72R3cjMaRzI0o/DGri026tQKcD9Uhap5vUs+NP6Zu4PdRWGVCzhMhHIlF:WMfCuj1RtaD4i026VuRPvCN4u4PrWMaF

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

OWARI

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Reads runtime system information 1 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/70689fcb460794c34c469199a1f6c85c.elf
    /tmp/70689fcb460794c34c469199a1f6c85c.elf
    1⤵
    • Reads runtime system information
    PID:325

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/325-1-0x00400000-0x00454890-memory.dmp