Analysis

  • max time kernel
    4s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20231215-en
  • resource tags

    arch:armhfimage:debian9-armhf-20231215-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    20-12-2023 00:26

General

  • Target

    7440b772e769abe5a702250cb5a218e8

  • Size

    51KB

  • MD5

    7440b772e769abe5a702250cb5a218e8

  • SHA1

    e8ea92cea744638849fbf713dd47c258aecd5d8d

  • SHA256

    b8d00f476a090af9f65bcd9de829be531e45cd4f9c63283a4d78afc953f08f07

  • SHA512

    196addd766c0f907e5498f41925eff56442f6795772a33e572950990b18f4932633d59cee7f27c8e6a5ad9826771d81d45bed52165899beeecf3716b1b0ec4af

  • SSDEEP

    1536:KO/l/6gBDW3JjPrkGGcw+gZNyxL4pgHdow:KON6YANgZNyxL4pg9ow

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

SORA

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Reads runtime system information 1 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/7440b772e769abe5a702250cb5a218e8
    /tmp/7440b772e769abe5a702250cb5a218e8
    1⤵
    • Reads runtime system information
    PID:647

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/647-1-0x00008000-0x00028978-memory.dmp