Analysis

  • max time kernel
    1s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20231221-en
  • resource tags

    arch:armhfimage:debian9-armhf-20231221-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    12/01/2024, 22:42

General

  • Target

    097d92f9c38dc1fae556478a8a1a921c80a75c88f26e94a943331f794751be13

  • Size

    35KB

  • MD5

    1d9a1f811817b5ff26ad422bb267c30c

  • SHA1

    94a7189d0fbdb08906a729b065238fcabec637de

  • SHA256

    097d92f9c38dc1fae556478a8a1a921c80a75c88f26e94a943331f794751be13

  • SHA512

    5d40dbeaeb17c9fbe0ff13d3ee3feac8fdc08768754bd01a5793403edd6dd887e6ba3239baeba104ff62c5da2e20a4f812729fbcc39898d87e821a40ed0ab094

  • SSDEEP

    768:VlpDuH355h9CulxpYCihiCYlH/oinrbq8kHzyQCAckiFbwkQwxMM3U4T:Vq5bFHpkiCY9/xn49tpimkQwZT

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

MIRAI

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Reads runtime system information 1 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/097d92f9c38dc1fae556478a8a1a921c80a75c88f26e94a943331f794751be13
    /tmp/097d92f9c38dc1fae556478a8a1a921c80a75c88f26e94a943331f794751be13
    1⤵
    • Reads runtime system information
    PID:658

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads