Analysis

  • max time kernel
    1s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20231222-en
  • resource tags

    arch:armhfimage:debian9-armhf-20231222-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    12-02-2024 02:42

General

  • Target

    4969aa8bc22ddb92c0b45cea512e676d658aca806a11bbd13e6781853b8efae8.elf

  • Size

    23KB

  • MD5

    2ec1acbdeb24bcb69a981fbcaa99f798

  • SHA1

    724e73ac85928cce62c1ab4bd543e6ddccdd36e9

  • SHA256

    4969aa8bc22ddb92c0b45cea512e676d658aca806a11bbd13e6781853b8efae8

  • SHA512

    64035606f40499ecbee6e8a873913a7e501c94f6fc0b931c715351f4431d87d317a6743d32fd7c7c1ef62b63b32d979fa1d4af9b912343c62c267828a10ccd16

  • SSDEEP

    384:DeJDmQsE1Jl6oFM4o8fus2vbVFgLaXsSWYeaMazjfUUH9hymdGUop5h5p:E3J5GTjYLa8Hxacys3Uoznp

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

SORA

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

Processes

  • /tmp/4969aa8bc22ddb92c0b45cea512e676d658aca806a11bbd13e6781853b8efae8.elf
    /tmp/4969aa8bc22ddb92c0b45cea512e676d658aca806a11bbd13e6781853b8efae8.elf
    1⤵
      PID:668

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads