Analysis

  • max time kernel
    2s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20231215-en
  • resource tags

    arch:armhfimage:debian9-armhf-20231215-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    13-02-2024 05:39

General

  • Target

    d9553d523831cec62b35f3dffd6cdc1b2162479f6174ff9b29d1c8f88a35aeac.elf

  • Size

    26KB

  • MD5

    a26f0334d170fd0892a9f1f722a745f0

  • SHA1

    b3c83670585d804c9839b09690bbc0ce401fe69f

  • SHA256

    d9553d523831cec62b35f3dffd6cdc1b2162479f6174ff9b29d1c8f88a35aeac

  • SHA512

    8b3f4065ae182c027fbb791b6dd8023c9ec1ab399aa3a626aa45bca5eedf8160a36dda07f12411b36fa9fbd4258aabf593084e0a5ce5599c4081bbd607f057a8

  • SSDEEP

    768:eMKyhegCCMqfWZPDrqXTi1msYfhu9q3UELul:NKy4qfWZPEiVATLA

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Reads runtime system information 1 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/d9553d523831cec62b35f3dffd6cdc1b2162479f6174ff9b29d1c8f88a35aeac.elf
    /tmp/d9553d523831cec62b35f3dffd6cdc1b2162479f6174ff9b29d1c8f88a35aeac.elf
    1⤵
    • Reads runtime system information
    PID:645

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/645-1-0x00008000-0x000228c4-memory.dmp