Analysis

  • max time kernel
    2s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20231215-en
  • resource tags

    arch:armhfimage:debian9-armhf-20231215-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    19/12/2023, 22:41

General

  • Target

    1f1a5b328461eda928a787fc45657452

  • Size

    55KB

  • MD5

    1f1a5b328461eda928a787fc45657452

  • SHA1

    82725987b22e635673f44c84cb2bc619995db3dc

  • SHA256

    2602ec7cbf882020ffc42e88464069edf45ba62448270f7b136e8739c1a3bf98

  • SHA512

    18307dbeac04e9d2ce21135a287a0920fdf2c944d3d36e27e50fe91223b10d2c63da99201ffb5dd062b05ce3f5eb6ebba7e58df32a7ea5392502cd6bda54e69d

  • SSDEEP

    1536:QpbolYK66Yxa/RszeqXf7E9edc+zkfgdNw8y:KbsYH6YgRszeYf7E64GNW

Score
10/10

Malware Config

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Reads runtime system information 1 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/1f1a5b328461eda928a787fc45657452
    /tmp/1f1a5b328461eda928a787fc45657452
    1⤵
    • Reads runtime system information
    PID:649

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads