Analysis

  • max time kernel
    1s
  • platform
    debian-9_mipsel
  • resource
    debian9-mipsel-20231215-en
  • resource tags

    arch:mipselimage:debian9-mipsel-20231215-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipselsystem
  • submitted
    19-12-2023 22:37

General

  • Target

    198e282d309f3a4d032e9b038a39e494

  • Size

    30KB

  • MD5

    198e282d309f3a4d032e9b038a39e494

  • SHA1

    461fa21a9ec76d1b1bbefb6bc695fe89979504a5

  • SHA256

    8e6ee33795216128db2f65494f6167307be8f089b0748e18634fef05a4780442

  • SHA512

    24117fc071ed1cb7f9f7b3967ec7cff72bde16c8ce3282e6b24c4c62cf8980408d5cbfe1fc8ed5e19f5d3875e7fba04e54f303d427d033678689d2d8422112c3

  • SSDEEP

    384:8e0qi6awyIwVtFscWRMlSRCyPSPQW8CDfxMic5z36hJgzIbkcLDIxueIVwRWGVCt:8DH6ZyIDc2K1PQ1CDOi8OjaueowWRXz

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

SORA

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Reads runtime system information 1 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/198e282d309f3a4d032e9b038a39e494
    /tmp/198e282d309f3a4d032e9b038a39e494
    1⤵
    • Reads runtime system information
    PID:711

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/711-1-0x00400000-0x00454ee0-memory.dmp