Analysis

  • max time kernel
    3s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20231215-en
  • resource tags

    arch:armhfimage:debian9-armhf-20231215-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    20-12-2023 00:05

General

  • Target

    7134fe72a3511e3a36d745e8e52d1d6e

  • Size

    37KB

  • MD5

    7134fe72a3511e3a36d745e8e52d1d6e

  • SHA1

    8f35b0a0d3ae386d8481285fef9d20c05ddbf3b9

  • SHA256

    d5191004e4b305ecf379373b957a49640753db2ac91f9d4e8ccd5ccfaf86beee

  • SHA512

    76e3df87d647fe5a1ff938d6cdf0d49b684949f633c0d983d68c098dbdf1c61b4deb035ed905f83673dcbab45d9956b50668fbedca1637b359593054e0cd73c5

  • SSDEEP

    768:OYNWUMzQ5B7885587kaNyMayWfv3MA6JMmSEgHsJ:tXMzgB78c8hyxyWnMACgHsJ

Score
10/10

Malware Config

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Reads runtime system information 1 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/7134fe72a3511e3a36d745e8e52d1d6e
    /tmp/7134fe72a3511e3a36d745e8e52d1d6e
    1⤵
    • Reads runtime system information
    PID:680

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads