Analysis

  • max time kernel
    3s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20231020-en
  • resource tags

    arch:armhfimage:debian9-armhf-20231020-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    21/10/2023, 18:32

General

  • Target

    NEAS.NEAS7ec829e4dc5dc5bd75a21a902f987a7d7474c1bcd8ae1d3547467e483ed39891elfelf_JC.elf

  • Size

    39KB

  • MD5

    4938bff2e61fa7269bef72c730027203

  • SHA1

    b0bddf5faa3fbd858ecf495b88c1cac1b3701370

  • SHA256

    7ec829e4dc5dc5bd75a21a902f987a7d7474c1bcd8ae1d3547467e483ed39891

  • SHA512

    f69f2af1b969c478bd73705efe16d34a349ff53e0af6774a8ee8f0ed97078a8ebc77b68037c230e68cff8bd65811692b64a28257e6e92aaa5c892e93c4b29809

  • SSDEEP

    768:DkJ56p6b4LMXOPAppDyVsgrgepgy52Q8Lw956eKpN9q3U7VU:+4p6b4Q+PGGVsgrFz6w956bpNRm

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

KYTON

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Reads runtime system information 1 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/NEAS.NEAS7ec829e4dc5dc5bd75a21a902f987a7d7474c1bcd8ae1d3547467e483ed39891elfelf_JC.elf
    /tmp/NEAS.NEAS7ec829e4dc5dc5bd75a21a902f987a7d7474c1bcd8ae1d3547467e483ed39891elfelf_JC.elf
    1⤵
    • Reads runtime system information
    PID:391

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads