Analysis

  • max time kernel
    2s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20231215-en
  • resource tags

    arch:armhfimage:debian9-armhf-20231215-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    20/12/2023, 01:43

General

  • Target

    7a83a6b53f10f9b7d7d6222c039ec63a

  • Size

    34KB

  • MD5

    7a83a6b53f10f9b7d7d6222c039ec63a

  • SHA1

    a15cae1bf3f6e6ef62851c50aa557cb5521bd891

  • SHA256

    6054d97947ca23ebb4d3e3f375e4fcb8c58225b0d4b8a0b29feb1bafdfaa6de6

  • SHA512

    2788e2f12f51e19e4bf3e7202cb4f93489a1e59b677f0e0511f2e20f33f198e44eb27c1e5735f38298ef6a192bac36ae071844a2356a588917a81297c2210b1e

  • SSDEEP

    768:lzcyDbGQOAWmGaGSuBRddFnqv8YMfTyqYqMNMCOz9q3UELQZp:lQyDbOQ1uBRlE1MfmqsMcLip

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

MIRAI

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Reads runtime system information 1 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/7a83a6b53f10f9b7d7d6222c039ec63a
    /tmp/7a83a6b53f10f9b7d7d6222c039ec63a
    1⤵
    • Reads runtime system information
    PID:655

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads