Analysis

  • max time kernel
    152s
  • max time network
    154s
  • platform
    ubuntu-18.04_amd64
  • resource
    ubuntu1804-amd64-20231026-en
  • resource tags

    arch:amd64arch:i386image:ubuntu1804-amd64-20231026-enkernel:4.15.0-213-genericlocale:en-usos:ubuntu-18.04-amd64system
  • submitted
    16-11-2023 04:51

General

  • Target

    x86.elf

  • Size

    32KB

  • MD5

    22bd06ae0d7a340b9d690b0ed7aedeef

  • SHA1

    834351d5ff88af96dbcc2cfcebd1be3b7a95edf0

  • SHA256

    0b4c5ec07f04c8b8a6ad6f185c6581a4b135adfd59ef7808da7daee5609d3e52

  • SHA512

    5cac4b59fada1b349e074fcb33c3653970b788171ab98cfd94f8b5bde8eeb6ac2f5fe634f7643654dc28440a8e781d81e4052f3a67fb8d601230427596406eb4

  • SSDEEP

    768:b+vtdTWUSEAF3O5+FYvanvr3cgXz5/edfkbTJGgKd:b+FdT9PAQ+3vr3byQTYgKd

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

MIRAI

C2

client.orxy.space

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Changes its process name 1 IoCs
  • Enumerates running processes

    Discovers information about currently running processes on the system

  • Reads runtime system information 64 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/x86.elf
    /tmp/x86.elf
    1⤵
    • Changes its process name
    PID:1532

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1532-1-0x0000000008048000-0x0000000008058ce0-memory.dmp