Analysis

  • max time kernel
    2s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20231215-en
  • resource tags

    arch:armhfimage:debian9-armhf-20231215-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    19/12/2023, 22:53

General

  • Target

    31b377dac4748c9155433cf2ab6cc916

  • Size

    27KB

  • MD5

    31b377dac4748c9155433cf2ab6cc916

  • SHA1

    42e326d34a85a5913768c565756a50f17ced0178

  • SHA256

    7285808fc9fbbe822a5e4db6a63bb294f8d511fd1c7b23a61edcef9a8b9511ad

  • SHA512

    0812f27345ba85a62370f463e4c8035cc6ea7a5a630962e56a6a0c09aac1238671cf2c9a9320bbc6cdc6c5b7cbdd6a625368d31c24e55c8e48776c583a423ac7

  • SSDEEP

    768:PYLMs1zZ8vGSb7IVHjNfbmTbRkhpB2OcnPOu779:PrspZQGSIFuw0PDl

Score
10/10

Malware Config

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Reads runtime system information 1 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/31b377dac4748c9155433cf2ab6cc916
    /tmp/31b377dac4748c9155433cf2ab6cc916
    1⤵
    • Reads runtime system information
    PID:657

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads