Analysis

  • max time kernel
    2s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20231215-en
  • resource tags

    arch:armhfimage:debian9-armhf-20231215-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    20/12/2023, 09:24

General

  • Target

    9c46998cdde0a344a26659fc32205b28

  • Size

    27KB

  • MD5

    9c46998cdde0a344a26659fc32205b28

  • SHA1

    ff22dd3bbe7e5292b0044449c81ba39a02f688c5

  • SHA256

    94eb4c7222c5057edb5d527ddb42e01cde585c499fb23a6ec7529a7e21016a1c

  • SHA512

    55aa71d81a44d22401b9682224b9f79761be0e165e2f1f0b12d9e7274b9bd121faa4ca81c50b706802bbbb2cfbc021ea4fd0fb30c9caf17b174989615dcccfb4

  • SSDEEP

    768:4sXuZggpPYVCaMRFx+J0dtOZTlNvE76WzFdqNU7Z:47qgi0aMRFMad+lk6e9

Score
10/10

Malware Config

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Reads runtime system information 1 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/9c46998cdde0a344a26659fc32205b28
    /tmp/9c46998cdde0a344a26659fc32205b28
    1⤵
    • Reads runtime system information
    PID:658

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads