Analysis

  • max time kernel
    152s
  • max time network
    154s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20231215-en
  • resource tags

    arch:armhfimage:debian9-armhf-20231215-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    19-12-2023 23:07

General

  • Target

    4767116e41025afc996b3385c30bed2f

  • Size

    43KB

  • MD5

    4767116e41025afc996b3385c30bed2f

  • SHA1

    ceeed8babba8e99250cefb947e4392b85e1734ab

  • SHA256

    5fe7c7486f902773e01acb76b04102b8fb4967128f8a66492988b7e587ca8138

  • SHA512

    bb766bc2a67c3ec0f90a31751a17891c617b2596175a04053551b7c057037cb3cfafc85314b724278db78f7058b5833bc3e8a2bbeec1c727e8b915712a2113c4

  • SSDEEP

    768:TfpgStf9M7YTKWacCtGH+4RtALFIQ/lDqnioFGYm0mu/RrGY:TBf+7HWpCpAQFIuWioTwgRrGY

Malware Config

Extracted

Family

mirai

Botnet

CONTROL

C2

x.purgepots.net

205.185.120.173

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Contacts a large (59867) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Reads runtime system information 16 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/4767116e41025afc996b3385c30bed2f
    /tmp/4767116e41025afc996b3385c30bed2f
    1⤵
    • Reads runtime system information
    PID:655

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads