Analysis

  • max time kernel
    1s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20231222-en
  • resource tags

    arch:armhfimage:debian9-armhf-20231222-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    02-01-2024 14:47

General

  • Target

    0115d9aec427447d63e245cad0099c19f11f9d6cb49ab675eef9388bdd33a997.elf

  • Size

    26KB

  • MD5

    36914a04314e5ebaac967e209c906438

  • SHA1

    91042ec78d8d64c6875e4cd7821c6dae3c629f68

  • SHA256

    0115d9aec427447d63e245cad0099c19f11f9d6cb49ab675eef9388bdd33a997

  • SHA512

    ae2c70b34f521573b28e7cd650b67200d285836cc27b9ccfa65b74289717dc58daaba1056e123e9bb8eae1bcb80ac8e4539494b01e0beafb678dd71d73333d3e

  • SSDEEP

    768:JMKyhegCCMqfizjoNpd2vJdX6vwrb9q3UELuF:OKy4qfqoeJdXWg6LM

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Reads runtime system information 1 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/0115d9aec427447d63e245cad0099c19f11f9d6cb49ab675eef9388bdd33a997.elf
    /tmp/0115d9aec427447d63e245cad0099c19f11f9d6cb49ab675eef9388bdd33a997.elf
    1⤵
    • Reads runtime system information
    PID:681

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/681-1-0x00008000-0x000228c4-memory.dmp