Analysis

  • max time kernel
    152s
  • max time network
    149s
  • platform
    ubuntu-18.04_amd64
  • resource
    ubuntu1804-amd64-20231222-en
  • resource tags

    arch:amd64arch:i386image:ubuntu1804-amd64-20231222-enkernel:4.15.0-213-genericlocale:en-usos:ubuntu-18.04-amd64system
  • submitted
    18/02/2024, 05:41

General

  • Target

    2c5ec634b6895ad6df4d8d38e082d690599788c4d805593601a96d97be0a51f9.elf

  • Size

    31KB

  • MD5

    500b884d421ee1d24c962f9abb46a70e

  • SHA1

    e2f3eea8c30ec6b79370c12dd0ed0b2f0b3ef427

  • SHA256

    2c5ec634b6895ad6df4d8d38e082d690599788c4d805593601a96d97be0a51f9

  • SHA512

    6f55ab8ec942012caa51869243b2370e33a6d2c2f3bb46581ef21b28da992e9300a6aabcd7d20f60a1a96dfccb76de324e1d48f550045502d943e5b2666273d0

  • SSDEEP

    768:BGvb+A02V/4ft3w48NhJ/dwjysJaC+mT/uKQ1:Bq74fJ2/dwZFm51

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

MIRAI

C2

client.orxy.space

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Changes its process name 1 IoCs
  • Enumerates running processes

    Discovers information about currently running processes on the system

  • Reads runtime system information 64 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/2c5ec634b6895ad6df4d8d38e082d690599788c4d805593601a96d97be0a51f9.elf
    /tmp/2c5ec634b6895ad6df4d8d38e082d690599788c4d805593601a96d97be0a51f9.elf
    1⤵
    • Changes its process name
    • Reads runtime system information
    PID:1608

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads