Analysis

  • max time kernel
    2s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20231026-en
  • resource tags

    arch:armhfimage:debian9-armhf-20231026-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    18/11/2023, 02:56

General

  • Target

    112af74ad15e8492d00c2e866cbd6406ce19740285eeb4e395c1a640fb56314c.elf

  • Size

    26KB

  • MD5

    c1d85a6a845f5fcff6f1eb8355adc762

  • SHA1

    649423c6a6436166b769663346e1c5feaa8b2527

  • SHA256

    112af74ad15e8492d00c2e866cbd6406ce19740285eeb4e395c1a640fb56314c

  • SHA512

    cd95da0ca9f8cfea63403b4814b229059f685ebd4efc1b49f3633312193a705e522245021390c3c02da7ae4a134188e60cd0b0ffb9a26e37e8235b15367fd203

  • SSDEEP

    768:Os1n26pu3fciMLR5ZqXp+Jnq8POFQU9q3UELf+:H1n26SF16q8PT9L2

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

SORA

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Reads runtime system information 1 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/112af74ad15e8492d00c2e866cbd6406ce19740285eeb4e395c1a640fb56314c.elf
    /tmp/112af74ad15e8492d00c2e866cbd6406ce19740285eeb4e395c1a640fb56314c.elf
    1⤵
    • Reads runtime system information
    PID:656

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads