Analysis
-
max time kernel
1s -
platform
debian-9_armhf -
resource
debian9-armhf-20231222-en -
resource tags
arch:armhfimage:debian9-armhf-20231222-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem -
submitted
08-01-2024 07:23
General
-
Target
5aa8d1916725b83e75bea46797aef1f4.elf
-
Size
33KB
-
MD5
5aa8d1916725b83e75bea46797aef1f4
-
SHA1
17a9efc704964236ced161a800cdb7d307b802d4
-
SHA256
492724a10a77ea635a2a9024c53c5545776ce2b4353be439be9569fcdcf6e4fe
-
SHA512
af906336b52a206d20736387af2957f52a51bbb64722ce1bacbe7de17a1bf8b36d54e4d24348beef696c0c1c265e220216124587c65de3946ffc42edd7c04de1
-
SSDEEP
768:Pjo3DbQQV/QCOZV+ydVJXhJgRV1QbDu4C/ueGRiu39q3UEL5Zz:Pjsb/OZV+mhJglyRMLj
Malware Config
Extracted
Family
mirai
Botnet
MIRAI
Signatures
-
Reads runtime system information 1 IoCs
Reads data from /proc virtual filesystem.
Processes:
5aa8d1916725b83e75bea46797aef1f4.elfdescription ioc Process File opened for reading /proc/self/exe 5aa8d1916725b83e75bea46797aef1f4.elf