Analysis

  • max time kernel
    1s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20231221-en
  • resource tags

    arch:armhfimage:debian9-armhf-20231221-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    12-02-2024 03:51

General

  • Target

    5589040002679b653c050618043f060046a7610d191f9518c00713090328239d.elf

  • Size

    31KB

  • MD5

    67d4762072bd903758979388993fe640

  • SHA1

    c1b745b91435521c97a73b177fd1da5b33aa6749

  • SHA256

    5589040002679b653c050618043f060046a7610d191f9518c00713090328239d

  • SHA512

    c94765877be884ed24377c0c16bd50b3cc1c2aa3843561bcf5a2d91abd27c50f5021778656577ef52190aa4fa341e702a4b6316868c1da5cb2499a0916ea5142

  • SSDEEP

    768:ErVGn7Vgx8RhDIWZFwLwRqfVh2gVw4V8mGbXj6Ii7ev9q3UELj3:ErVG8A5dFUYGwSCbX+IifLr

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

SORA

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Reads runtime system information 1 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/5589040002679b653c050618043f060046a7610d191f9518c00713090328239d.elf
    /tmp/5589040002679b653c050618043f060046a7610d191f9518c00713090328239d.elf
    1⤵
    • Reads runtime system information
    PID:658

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/658-1-0x00008000-0x0002daa4-memory.dmp