Analysis

  • max time kernel
    3s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20231215-en
  • resource tags

    arch:armhfimage:debian9-armhf-20231215-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    16-02-2024 06:14

General

  • Target

    9a1dc4782799311a4ab5329b4b4f360c97682946f627351bb7cba3f75d0b5620.elf

  • Size

    26KB

  • MD5

    395c2a10969ba9beab96862c36b8ccb5

  • SHA1

    1c2e45eabfbba871b1603cf77ba610d875e1eb10

  • SHA256

    9a1dc4782799311a4ab5329b4b4f360c97682946f627351bb7cba3f75d0b5620

  • SHA512

    30f6473a4c2de7c40f582c03e44e4b971a6ac793ccc0937c11cf5739f921f72c0b86bf4becfebc58798b53ed07c9d0f74d22fd1c003706441fb9b91706d673c4

  • SSDEEP

    768:JMKyhegCCMqfizjoNpd2vJdX6vwrK9q3UELu+:OKy4qfqoeJdXWg/Lz

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Reads runtime system information 1 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/9a1dc4782799311a4ab5329b4b4f360c97682946f627351bb7cba3f75d0b5620.elf
    /tmp/9a1dc4782799311a4ab5329b4b4f360c97682946f627351bb7cba3f75d0b5620.elf
    1⤵
    • Reads runtime system information
    PID:680

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/680-1-0x00008000-0x000228c4-memory.dmp