Analysis

  • max time kernel
    2s
  • max time network
    124s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20230831-en
  • resource tags

    arch:armhfimage:debian9-armhf-20230831-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    29-09-2023 19:32

General

  • Target

    71eadc9da0901e477ef672f7f112f409.elf

  • Size

    28KB

  • MD5

    71eadc9da0901e477ef672f7f112f409

  • SHA1

    dd5e3214b89699b83951dd5bf18a17ccae02d8e9

  • SHA256

    26205b85dbfc94d799f4299dc0c868cc6d0c5160e0f19410bb8c1314fc883be0

  • SHA512

    acc09114f3a5118bbceb47e940b242d69429f7b2d684aed0c3100b879a09412651c3e7cb243d8293396dbbd2f0fda68218328b9ae05483805aadd819b1c248dd

  • SSDEEP

    768:EusHfRavjynNKnjFcZIhQzhKMXga9q3UEL7q:WRwynNIOQQ1KMwPLG

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

SORA

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Reads runtime system information 1 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/71eadc9da0901e477ef672f7f112f409.elf
    /tmp/71eadc9da0901e477ef672f7f112f409.elf
    1⤵
    • Reads runtime system information
    PID:373

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads