Analysis

  • max time kernel
    2s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20231215-en
  • resource tags

    arch:armhfimage:debian9-armhf-20231215-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    19-12-2023 22:43

General

  • Target

    2178b631537e456b7757b780f4adf305

  • Size

    33KB

  • MD5

    2178b631537e456b7757b780f4adf305

  • SHA1

    7cf264a477f7385550236f0775978c2b5a115cb7

  • SHA256

    7bb54b7b5b5c9cbadae82f2bb7d24af689a680c1933ba7a1dbca4e732d2fc968

  • SHA512

    90edcf82f3a9caf40cbcbb5e15bf4f5b67028bc40e0a7e9d20a1e467963fe262dae02ce45be1a56c974320564742d13a7f3264391059c4ac13afea51af40309c

  • SSDEEP

    768:garjeCSi9ZoHN3Hv1rdjJiazFDVZF7nELwWzP+Nb9q3UELf5:ga3eYu/Rdlx/rlWzPJLh

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

UNST

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Reads runtime system information 1 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/2178b631537e456b7757b780f4adf305
    /tmp/2178b631537e456b7757b780f4adf305
    1⤵
    • Reads runtime system information
    PID:650

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/650-1-0x00008000-0x0002dc58-memory.dmp