Analysis

  • max time kernel
    1s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20231222-en
  • resource tags

    arch:armhfimage:debian9-armhf-20231222-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    14-02-2024 10:13

General

  • Target

    9b67db2c6c759f355f16b70bfda3b16c

  • Size

    25KB

  • MD5

    9b67db2c6c759f355f16b70bfda3b16c

  • SHA1

    a236603d0e37a8973a4af283d48408dbfb4d8d6c

  • SHA256

    a370a04a73e0848a3cc0d7d49238711d79d8e92a784886445e04c18b4bcf5dee

  • SHA512

    e410d58326c7f8743b1330f74be7f73ebe46a056d3a3c0191fa6e36a4c5457a8f6e77c52b7a1a0f24a7da109d167e9ec745df5c39f3c3b6a6ce8d6379b303ae3

  • SSDEEP

    384:mjquUa7cDhI+tzHzfcuEILFmWYpcyhBd0RMQn09ilZWuMZdEDoDrhymdGUop5hl4:037cDjNEIrmfhY+ZdECs3UozH4

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

Processes

  • /tmp/9b67db2c6c759f355f16b70bfda3b16c
    /tmp/9b67db2c6c759f355f16b70bfda3b16c
    1⤵
      PID:676

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/676-1-0x00008000-0x0001f588-memory.dmp