Analysis

  • max time kernel
    2s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20231215-en
  • resource tags

    arch:armhfimage:debian9-armhf-20231215-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    12-02-2024 02:20

General

  • Target

    112a6d015cee6d905c88020ff03f57442041be6fd77f6222215473aa4ca03950.elf

  • Size

    38KB

  • MD5

    2bea5c7e92b616de8677d7587e152066

  • SHA1

    601aa5a603b57df83e45bd9738943be1809e473d

  • SHA256

    112a6d015cee6d905c88020ff03f57442041be6fd77f6222215473aa4ca03950

  • SHA512

    c9b5d5b3d70194eefeb5792080e376f2c75d2b212c47c1d39edf980be3d8d424d7880dbc315e578419126c6f0a466033ec93688361f75f279e6ece777d42890d

  • SSDEEP

    768:7hoMTjoHlyjWeGFvU0jmXYMrnGMFHUsnbusgRGOQw/sVcUThwyq3UIru:7TjBjLG60PM7BFROGvxThw1q

Score
10/10

Malware Config

Extracted

Family

mirai

C2

scan.rebirthltd.top

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Reads runtime system information 1 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/112a6d015cee6d905c88020ff03f57442041be6fd77f6222215473aa4ca03950.elf
    /tmp/112a6d015cee6d905c88020ff03f57442041be6fd77f6222215473aa4ca03950.elf
    1⤵
    • Reads runtime system information
    PID:658

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads