Analysis

  • max time kernel
    1s
  • max time network
    124s
  • platform
    linux_armhf
  • resource
    debian9-armhf-en-20211208
  • resource tags

    arch:armhfimage:debian9-armhf-en-20211208kernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    01-10-2023 08:34

General

  • Target

    e060c1e84827d320246b86085872a3f3.elf

  • Size

    26KB

  • MD5

    e060c1e84827d320246b86085872a3f3

  • SHA1

    12fe2940f6aaa10c27376f95fb10e07e01738300

  • SHA256

    572f09caf213c9716d875e3152ab88096414cbe20268bef9b5288b5e6d9ec3f4

  • SHA512

    4cce3ed520da604816a6a0ad482ac8590131c87d4c33b049d705c4da35b614ee44d00d1e5afc3bcaaa57418cdb48dd01c9c563a9d6e2d695ff03a70e9c1f81a4

  • SSDEEP

    768:JMKyhegCCMqfizjoNpd2vJdX6vwrfH9q3UELuy:OKy4qfqoeJdXWgfWLr

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Reads runtime system information 1 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/e060c1e84827d320246b86085872a3f3.elf
    /tmp/e060c1e84827d320246b86085872a3f3.elf
    1⤵
    • Reads runtime system information
    PID:368

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads