Analysis

  • max time kernel
    146s
  • max time network
    151s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20230831-en
  • resource tags

    arch:armhfimage:debian9-armhf-20230831-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    04/10/2023, 18:10

General

  • Target

    91699fe260cfe3d8b306b1f1cdc2ff61c43f2b9b91f63b23f38d72b24154be6e_JC.elf

  • Size

    41KB

  • MD5

    b030a1ce84923325c78d24d1d3f25cb5

  • SHA1

    88e3541f5a47f4e778007cf7489e31ff5e62771a

  • SHA256

    91699fe260cfe3d8b306b1f1cdc2ff61c43f2b9b91f63b23f38d72b24154be6e

  • SHA512

    443186499d60d83935633eb20a6bed2f2583390f37c4c5724c4b47371ebbd7edb858aa2c1ccfadc9b63c848431c878e497737f4509f9d5f7f0d7f5de94e25546

  • SSDEEP

    768:LAETdTUjhTVFzBOoVELmB9PjDFIrhq3UIdql1+YO2AHlTQYDL48y8VosSv:cETdTAPhImBBDFa1KD/4JnsSv

Score
10/10

Malware Config

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Changes its process name 1 IoCs
  • Enumerates running processes

    Discovers information about currently running processes on the system

  • Reads runtime system information 64 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/91699fe260cfe3d8b306b1f1cdc2ff61c43f2b9b91f63b23f38d72b24154be6e_JC.elf
    /tmp/91699fe260cfe3d8b306b1f1cdc2ff61c43f2b9b91f63b23f38d72b24154be6e_JC.elf
    1⤵
    • Changes its process name
    PID:371

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads