Analysis

  • max time kernel
    0s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20240221-en
  • resource tags

    arch:armhfimage:debian9-armhf-20240221-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    23-02-2024 05:32

General

  • Target

    bc78c4c116439a265db250b68da8fe80c440ba5e7a80a830443d4bda52b20a78.elf

  • Size

    18KB

  • MD5

    b267acee9dd034d85ff8f0bb02e30cc1

  • SHA1

    321286afa08f92eebb2b2100acafe3b8c74d3540

  • SHA256

    bc78c4c116439a265db250b68da8fe80c440ba5e7a80a830443d4bda52b20a78

  • SHA512

    7d59920175cb093578ae37549727612f752003df20a47c9068954160bf58c8e9f4c84f3790f3a2de187b40c92eee7a21476a76d946297050972a6937ab56ef07

  • SSDEEP

    384:MjWzRV0P6iOwrkom0DRnVATuSlShu6NvmPWtUn+KMavhymdGUop5h5lq:6GV0P6+kom0tVAoNvm+to1vs3Uoznlq

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

Processes

  • /tmp/bc78c4c116439a265db250b68da8fe80c440ba5e7a80a830443d4bda52b20a78.elf
    /tmp/bc78c4c116439a265db250b68da8fe80c440ba5e7a80a830443d4bda52b20a78.elf
    1⤵
      PID:634

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/634-1-0x00008000-0x0001b6e4-memory.dmp