Analysis

  • max time kernel
    1s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20231221-en
  • resource tags

    arch:armhfimage:debian9-armhf-20231221-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    24/01/2024, 12:24

General

  • Target

    723b5784e2ee7fac9180b20b9d839eee

  • Size

    25KB

  • MD5

    723b5784e2ee7fac9180b20b9d839eee

  • SHA1

    1a2df3b412691ef71bd8f598210196d43317dbc6

  • SHA256

    48ac79c8cc242c19e12d1792901b1c7e91a7184f13b4b412c98fbddd39e94242

  • SHA512

    721e35bfe832a9477cf4196dc9db87c6710b278c708e34a1fd113ea1a212cc4009ae36eff9956f4869e6bac025784852c2b90be6d45f6fc81665a161d31b0ba7

  • SSDEEP

    768:xRSa8ZS/L6rze3OXrFKg9KZrqoDu2pbs3UozYe:vSjFJXZBCJDu2QzJ

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

Processes

  • /tmp/723b5784e2ee7fac9180b20b9d839eee
    /tmp/723b5784e2ee7fac9180b20b9d839eee
    1⤵
      PID:663

    Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads