Analysis

  • max time kernel
    3s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20231215-en
  • resource tags

    arch:armhfimage:debian9-armhf-20231215-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    12-02-2024 03:41

General

  • Target

    71676632445b627ced92c42f14fab97e72158fc08b5f4490fb50792f1c20f820.elf

  • Size

    26KB

  • MD5

    d659cddf70f09d4ee94e610060674377

  • SHA1

    910cffa3fd135e54e9214ff5141c65207f7a194f

  • SHA256

    71676632445b627ced92c42f14fab97e72158fc08b5f4490fb50792f1c20f820

  • SHA512

    48427207f011dd6ad6a77d5002215f92ede0e941c0a2909142500ad621c7326c7c282f01debdb60ac5d652a85b67e6cf37753e9c18e14c942aac44998500361f

  • SSDEEP

    768:wyE25TleI+cRA6Krc9NVy79uxOTs3Uozf:wyP5TJ+cRA6v5DxTzf

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

SORA

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Reads runtime system information 1 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/71676632445b627ced92c42f14fab97e72158fc08b5f4490fb50792f1c20f820.elf
    /tmp/71676632445b627ced92c42f14fab97e72158fc08b5f4490fb50792f1c20f820.elf
    1⤵
    • Reads runtime system information
    PID:681

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/681-1-0x00008000-0x0002157c-memory.dmp