Analysis

  • max time kernel
    2s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20231215-en
  • resource tags

    arch:armhfimage:debian9-armhf-20231215-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    19/12/2023, 22:44

General

  • Target

    23d5917d58df1e4b711d80d318fa3cec

  • Size

    50KB

  • MD5

    23d5917d58df1e4b711d80d318fa3cec

  • SHA1

    eee8172a99053e2d7794dd56c6b53cba28b8078f

  • SHA256

    11ed6de60c0d028d27ccc0698a034af853da92d722dcba5e84753aba4c440e64

  • SHA512

    8a707cffae1909810dfd59594728a18dec6c9558014393b324c797daa5c25629cd27ddea8da0cddc3ded679d6112f8927ea33e4bc69712484c08b55defe517c5

  • SSDEEP

    1536:nNXwhiQ/pZkIwO/8kFgP5KWF8LXpA3fCXvAIE5:nEpSIwVkYHKLqCXYz

Score
10/10

Malware Config

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Reads runtime system information 1 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/23d5917d58df1e4b711d80d318fa3cec
    /tmp/23d5917d58df1e4b711d80d318fa3cec
    1⤵
    • Reads runtime system information
    PID:648

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads