Analysis

  • max time kernel
    1s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20231221-en
  • resource tags

    arch:armhfimage:debian9-armhf-20231221-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    13-02-2024 03:06

General

  • Target

    5862a78adddbaaceec44f47aa65f7346e4574c487b983abe69f1feada2deadf8.elf

  • Size

    31KB

  • MD5

    1f2d6d9d6e605d7854fc62a234c43bda

  • SHA1

    9d48f1034364127a014031e88d7ec0cb32fecd39

  • SHA256

    5862a78adddbaaceec44f47aa65f7346e4574c487b983abe69f1feada2deadf8

  • SHA512

    27271a9c20c2003c8afaca157c4b7c38781903854cbc6ce9b7066ff3b5fb3541080e747f58c2533805864545139d08b4f3274ce577f48cb54005d27432601305

  • SSDEEP

    768:TEKkUgXAnURCr6HmDFStmYtDdq9q3UELd0:/kEn7uHEem0fLW

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

SORA

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Reads runtime system information 1 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/5862a78adddbaaceec44f47aa65f7346e4574c487b983abe69f1feada2deadf8.elf
    /tmp/5862a78adddbaaceec44f47aa65f7346e4574c487b983abe69f1feada2deadf8.elf
    1⤵
    • Reads runtime system information
    PID:663

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/663-1-0x00008000-0x0002da94-memory.dmp