Analysis

  • max time kernel
    3s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20231215-en
  • resource tags

    arch:armhfimage:debian9-armhf-20231215-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    20-12-2023 17:56

General

  • Target

    fe749d949a357a7fde23da5a2a43e9b5

  • Size

    24KB

  • MD5

    fe749d949a357a7fde23da5a2a43e9b5

  • SHA1

    799b4590f788dd4cb36247ddf6220923597a8c82

  • SHA256

    69f12b79bbf6320b7a0c6d840c43ea903ff0edb5d88d731b4cd449562d80c6ee

  • SHA512

    a53beeb6a72660495d1254d1b58eff505ba6121f270e4a9b0182da23110558aa2737d687c5f13ab4463d718af72726f41438b0ab4be343dc35eb3b53bf656124

  • SSDEEP

    384:6qi8yJxZcv6H4oEgXUFyqiYA/byjNfnsgqOyM1MzdCZmdGU5EVm:62QZcCHRuFi/basgGCZ3Uz

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

IPOC

C2

pma.jarry.online

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Reads runtime system information 1 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/fe749d949a357a7fde23da5a2a43e9b5
    /tmp/fe749d949a357a7fde23da5a2a43e9b5
    1⤵
    • Reads runtime system information
    PID:691

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/691-1-0x00008000-0x0001d6a4-memory.dmp