Analysis

  • max time kernel
    2s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20231215-en
  • resource tags

    arch:armhfimage:debian9-armhf-20231215-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    20-12-2023 05:40

General

  • Target

    889de9de5cbe072a976fbe0c69d694fd

  • Size

    28KB

  • MD5

    889de9de5cbe072a976fbe0c69d694fd

  • SHA1

    29fd11021bfc8801e56555bb19d65957b3e09a74

  • SHA256

    b933c1fb5832dee396c792f39cc639e70d6388b9fd3273b8d7384617c52a0243

  • SHA512

    add4b27ab9c37ffe1791a1d2413c9102bdc76d822bcc9b5c4b4193487df05155f7461cacbcf73024ca53512c414c16fa9f40cbe5db1db43657519f4492bb0f3f

  • SSDEEP

    768:WfijpmMedzzD2a19OB3knbzPj9q3UELWY:WNx2aiBQfiLF

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

SORA

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Reads runtime system information 1 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/889de9de5cbe072a976fbe0c69d694fd
    /tmp/889de9de5cbe072a976fbe0c69d694fd
    1⤵
    • Reads runtime system information
    PID:648

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads