Analysis

  • max time kernel
    4s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20231215-en
  • resource tags

    arch:armhfimage:debian9-armhf-20231215-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    20-12-2023 00:11

General

  • Target

    7282718594f654d1972954433785c2f1

  • Size

    28KB

  • MD5

    7282718594f654d1972954433785c2f1

  • SHA1

    37b1327b8808af7c9492aa4e67bad9a919043da5

  • SHA256

    9bb464c13a404d9f1b714610f025241cf3bdc47a8ba69c9ec264777f68050c7b

  • SHA512

    e9c94b0397034ee4cfffa03395c959d78a445953e81316a47621864e0e6839ea50e7e3b795ae04a4c9343ade99133a1b43f27754ec551f9fe5d484a27515a78c

  • SSDEEP

    768:2PBzn+XUccT5mOarfwogVi3ZtGD9q3UELnj:2Zn+XUcALarfTgViCCLj

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

SORA

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Reads runtime system information 1 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/7282718594f654d1972954433785c2f1
    /tmp/7282718594f654d1972954433785c2f1
    1⤵
    • Reads runtime system information
    PID:662

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/662-1-0x00008000-0x00022780-memory.dmp