Analysis

  • max time kernel
    2s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20231215-en
  • resource tags

    arch:armhfimage:debian9-armhf-20231215-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    19/12/2023, 22:44

General

  • Target

    23389be425f8127636333b6afedaf437

  • Size

    21KB

  • MD5

    23389be425f8127636333b6afedaf437

  • SHA1

    e26b039694a7e66da40121c0c03e6898b600860b

  • SHA256

    b7da63f14b4ee3a83a7a08e854abc29083222e3fd2beecefb0804d7eb1cdea6c

  • SHA512

    d28d39fff62fea5ce54f3e610dea272077d77ef1f14183842c7fabcd1449410fc9da19bebde717d6f0d39b30a3da0d06a708d0976c2d56abd286d98d9b05700e

  • SSDEEP

    384:WtZoiMLG0oHjJyTbodJh451cIahFLYfCPNhiqBObCiamdGU5EGQ:WtZlMq0RYfybcIqK+Nxv3UZQ

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

IPOC

C2

pma.jarry.online

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Reads runtime system information 1 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/23389be425f8127636333b6afedaf437
    /tmp/23389be425f8127636333b6afedaf437
    1⤵
    • Reads runtime system information
    PID:649

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads