Analysis

  • max time kernel
    0s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20240226-en
  • resource tags

    arch:armhfimage:debian9-armhf-20240226-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    28-02-2024 16:30

General

  • Target

    21512f7236e928410d11e4b12de8d12e8dfe27a8626c8d0ad2a02fd5ba7d5b1c.elf

  • Size

    32KB

  • MD5

    81fcf04ded99e7d651c16445fa0777ba

  • SHA1

    2733c7dfa17fb00d3b114ec726950995fe453fa7

  • SHA256

    21512f7236e928410d11e4b12de8d12e8dfe27a8626c8d0ad2a02fd5ba7d5b1c

  • SHA512

    ea64eef735bbed383adc325c28d48b06bbbb287225d239b7f7ce42d265ce607482e1c6bf3518963e8a4d9784acd2735d9a493bba1d55dea8f8a018cdb529d8a2

  • SSDEEP

    768:PoiWiO031vpAPbrVWZK3XVGxm9XwSDJc9q3UEL5II:Porm1vpALgUJBDnL3

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

SORA

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Reads runtime system information 1 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/21512f7236e928410d11e4b12de8d12e8dfe27a8626c8d0ad2a02fd5ba7d5b1c.elf
    /tmp/21512f7236e928410d11e4b12de8d12e8dfe27a8626c8d0ad2a02fd5ba7d5b1c.elf
    1⤵
    • Reads runtime system information
    PID:643

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads