Analysis

  • max time kernel
    1s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20231221-en
  • resource tags

    arch:armhfimage:debian9-armhf-20231221-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    09-02-2024 07:55

General

  • Target

    ef07d2f030ba0ad81345e416211dda79.elf

  • Size

    21KB

  • MD5

    ef07d2f030ba0ad81345e416211dda79

  • SHA1

    e291af584b8943bf95cc6bd329802e0ebece1c98

  • SHA256

    217ff6df6a95dd5391ec93784d39536b9207b0c1042cb8155679a80ef4193d83

  • SHA512

    d3839d6bdae806defdd4af26d0b5e8881b05ae2a3704f95a1d6637d7eae38ee2874e24adc56dda794d79d682e2d3b079a12f95b7fccd84e154e1b48d1f0cdfc6

  • SSDEEP

    384:TJr5zC/5TQrnpEY9EOHBN8yzfxztjFc77Jb1A+RBy5Z4z+mdGU5eT6NujgMg:MhQXEOHB3hjs7JW+Rm4z+3UQeFMg

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Reads runtime system information 1 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/ef07d2f030ba0ad81345e416211dda79.elf
    /tmp/ef07d2f030ba0ad81345e416211dda79.elf
    1⤵
    • Reads runtime system information
    PID:668

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads