Analysis

  • max time kernel
    0s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20240226-en
  • resource tags

    arch:armhfimage:debian9-armhf-20240226-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    27-02-2024 17:21

General

  • Target

    4c787b4c57e4081b2dafa3ed596fa528.elf

  • Size

    51KB

  • MD5

    4c787b4c57e4081b2dafa3ed596fa528

  • SHA1

    32d937bef0e831836d10b33572fbdb9dc8d2ca67

  • SHA256

    9ab67f60227e1b8afa35fe43db105b64640be4e0bb577f40bb4bb90333af4536

  • SHA512

    71ec3e5e10935076da0f5ae6cdafc3a0694b6a69f299fc3f0052e90496c2c0689c2aaaaba63861fec3e5a235dd0801151db05b7e5a47d512dc68605919a789ff

  • SSDEEP

    1536:M9O/ZMAXIxNUk0beLcPqF1aBexo4opKZbk:M9O/ZNKyWLGqFUFd

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

SORA

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Reads runtime system information 1 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/4c787b4c57e4081b2dafa3ed596fa528.elf
    /tmp/4c787b4c57e4081b2dafa3ed596fa528.elf
    1⤵
    • Reads runtime system information
    PID:651

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/651-1-0x00008000-0x00029794-memory.dmp