Analysis

  • max time kernel
    2s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20231215-en
  • resource tags

    arch:armhfimage:debian9-armhf-20231215-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    19-12-2023 23:21

General

  • Target

    5cbfb0a6348c9cce4814a97a3e4eccee

  • Size

    49KB

  • MD5

    5cbfb0a6348c9cce4814a97a3e4eccee

  • SHA1

    888832020310ac740d5623f2636cadcf6795ef34

  • SHA256

    b8cae63b5731c16624522f7086d33e700297a2cd09c15246eb919499a01580fd

  • SHA512

    1350d743bb88c4c7be7ae956052fd83721144336f752146eedff596e1b91d33d6ea4f8c2210a14df52b5e3ff734b80ff7c52cd9a6bca4082eab3f6e44008c6b1

  • SSDEEP

    1536:O+pdac0gIMzPUYf8m6IpHLgPDw4cyQWjZp:PNUeHtLkDwPyQWjZp

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

SORA

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Reads runtime system information 1 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/5cbfb0a6348c9cce4814a97a3e4eccee
    /tmp/5cbfb0a6348c9cce4814a97a3e4eccee
    1⤵
    • Reads runtime system information
    PID:656

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/656-1-0x00008000-0x000275b0-memory.dmp