Analysis

  • max time kernel
    3s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20231215-en
  • resource tags

    arch:armhfimage:debian9-armhf-20231215-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    19/12/2023, 22:40

General

  • Target

    1d6f541e2cfb86578f606758f31d105a

  • Size

    27KB

  • MD5

    1d6f541e2cfb86578f606758f31d105a

  • SHA1

    b148d5913b93dd23138fbd21af390140d9f403ce

  • SHA256

    b15bc7be03d7be34f3d14fa7e349d0ab02b09aa7fc513639cabfa8aeef8cf538

  • SHA512

    a2d43531d01cfdb8da5627ce28fab3b16ae77dc5c7231924097dbaf9f2b287b685fa2eecc7e4ad2e3f36914481165630f3e9c04921d6a34f42e567064933e0e2

  • SSDEEP

    768:Mz7c9ln6Ln/yRx7AEcG1E0Gdsg15L79q3UELji:2kl6LaJx99QLaL+

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

SORA

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Reads runtime system information 1 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/1d6f541e2cfb86578f606758f31d105a
    /tmp/1d6f541e2cfb86578f606758f31d105a
    1⤵
    • Reads runtime system information
    PID:674

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads