Analysis

  • max time kernel
    1s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20231222-en
  • resource tags

    arch:armhfimage:debian9-armhf-20231222-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    14/02/2024, 09:07

General

  • Target

    896775095cde29e1550398662de8cf8d.elf

  • Size

    26KB

  • MD5

    896775095cde29e1550398662de8cf8d

  • SHA1

    bf7372387261d109c5443ac8b5d9d1faebb9c2a5

  • SHA256

    e535d7b38c2a09d389692503e62a34d52446cd8cd3ddac3a85e0ebd76df7b791

  • SHA512

    57ea6feb1faee6b67c1008b998d3b095aab65e13020ac545ac04f30000004c118190a5005643717f96690394877f3652c6b1e14bef7cd91b3d65b287f2865c8a

  • SSDEEP

    768:iCGeaj3jnpGLwNc81Rh1a3dZ6XNLgI/hs3UozY:rhajLwocoRha6X+I/MzY

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

SORA

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Reads runtime system information 1 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/896775095cde29e1550398662de8cf8d.elf
    /tmp/896775095cde29e1550398662de8cf8d.elf
    1⤵
    • Reads runtime system information
    PID:656

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads