Analysis

  • max time kernel
    3s
  • max time network
    0s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20231215-en
  • resource tags

    arch:armhfimage:debian9-armhf-20231215-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    19/12/2023, 23:16

General

  • Target

    5503e66bb75275f2d452f49ee0fe9eba

  • Size

    33KB

  • MD5

    5503e66bb75275f2d452f49ee0fe9eba

  • SHA1

    4754d6ed1d32da5723b10591594510c877e5873a

  • SHA256

    36b57edca5860b1f386dadd4ee6bbe7837475425ae4938f2a7ef148f3b499ad4

  • SHA512

    07cb35cc01527f594e9c7ced8d422f2be1ebbb0df063e58be3a4c24ea1ae836ced73994dee0a49f3d127c1d8fbf7365aba022c48eebdc674a559255f1bda9939

  • SSDEEP

    768:aYVgAxkU1RHz5poClGL1aMnXha7WBNoWhSxHjbb9q3UELCC:aYyAxdRH9zILLBBrodj+L9

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Reads runtime system information 1 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/5503e66bb75275f2d452f49ee0fe9eba
    /tmp/5503e66bb75275f2d452f49ee0fe9eba
    1⤵
    • Reads runtime system information
    PID:690

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads