Analysis

  • max time kernel
    132s
  • max time network
    66s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20231221-en
  • resource tags

    arch:armhfimage:debian9-armhf-20231221-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    12-02-2024 02:42

General

  • Target

    48cd7492ee4b71bc4203dc06c6ed5e9b452fdee662ce21e6633ff07d4255fa72.elf

  • Size

    33KB

  • MD5

    7604f9ccf0e615206f77f7438646c31d

  • SHA1

    a60064e5bb7906a1ff70882d8465b23ccf76552b

  • SHA256

    48cd7492ee4b71bc4203dc06c6ed5e9b452fdee662ce21e6633ff07d4255fa72

  • SHA512

    46449ad2faf3231a92fa0172d2a6eb9e79acc236691e8b9748e540dfcd98e6faeda7a2468f349707a5317deec0be9520cce9d4a126f85e456060e0f2ff54c0a7

  • SSDEEP

    768:t/AX49kYDJ9GPnoAr9ttMW4UwTK/8nVxr1xQdTIVRR7o3UC:GPno+CWcjn31xImRR7Y

Score
10/10

Malware Config

Extracted

Family

mirai

C2

scan.rebirthltd.top

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Deletes itself 1 IoCs
  • Reads runtime system information 2 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/48cd7492ee4b71bc4203dc06c6ed5e9b452fdee662ce21e6633ff07d4255fa72.elf
    /tmp/48cd7492ee4b71bc4203dc06c6ed5e9b452fdee662ce21e6633ff07d4255fa72.elf
    1⤵
    • Deletes itself
    • Reads runtime system information
    PID:683

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads