Analysis

  • max time kernel
    3s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20231215-en
  • resource tags

    arch:armhfimage:debian9-armhf-20231215-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    19/01/2024, 16:43

General

  • Target

    682041371c34e403e88bb98c33b146ec

  • Size

    24KB

  • MD5

    682041371c34e403e88bb98c33b146ec

  • SHA1

    4e4ceb7320bbf2451e93888379b30af85c617212

  • SHA256

    525f43387acee0158eecac587cf4e652b73ec92280f2cd456ff0b8d79d9e3bb5

  • SHA512

    913265a3263cf843f1c161b9c7196124ce1d1e4cef4eb645d329a74fae4d73805a5ce29e7bc3622bf6907e926b1e5121cbdd965f946a921a396bba4532bc6c05

  • SSDEEP

    384:cZ0X9nxn8o9ir/nSdoijsN2e4JQkCD2EjKb3p3YhymdGUop5h4:5X9nxn8o9wnBoWzEQf2EjKb3pIs3Uoz+

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

SORA

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Reads runtime system information 1 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/682041371c34e403e88bb98c33b146ec
    /tmp/682041371c34e403e88bb98c33b146ec
    1⤵
    • Reads runtime system information
    PID:669

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads