Analysis

  • max time kernel
    2s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20231215-en
  • resource tags

    arch:armhfimage:debian9-armhf-20231215-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    13/02/2024, 02:51

General

  • Target

    038187ceb4df706b13967d2a4bff9f67256ba9615c43196f307145a01729b3b8.elf

  • Size

    36KB

  • MD5

    eb895b6745f0266d0317266e2261d761

  • SHA1

    e9b45ce39ff9ce32a6cb42f9ea38adb346afa7b4

  • SHA256

    038187ceb4df706b13967d2a4bff9f67256ba9615c43196f307145a01729b3b8

  • SHA512

    27c787e142c9fb28fb44feaab6253bd5e93ae58f342faa2d120ae43396c269c1155b061fe4e292fe8b305beb085a218616b965efc5507d4838de9e7220188c4d

  • SSDEEP

    768:RLkR4RUun7S139GxKUgfGGFc+rfZ7CVAFnBidqq9q3UELnYP:RYqqum139eejFDBXLYP

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

MIRAI

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Reads runtime system information 1 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/038187ceb4df706b13967d2a4bff9f67256ba9615c43196f307145a01729b3b8.elf
    /tmp/038187ceb4df706b13967d2a4bff9f67256ba9615c43196f307145a01729b3b8.elf
    1⤵
    • Reads runtime system information
    PID:650

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads