Analysis
-
max time kernel
0s -
platform
debian-9_armhf -
resource
debian9-armhf-20240226-en -
resource tags
arch:armhfimage:debian9-armhf-20240226-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem -
submitted
05-03-2024 02:49
General
-
Target
da0d2e3d03a4c5096ba4b4325c53b66093c2c8de07bf11fdd0aa1ef6212e158c.elf
-
Size
50KB
-
MD5
6f5ad8e8f2ddfb3b7738661ab6fd1c17
-
SHA1
6e71c5affa998db19eaa5655ffdb8ad15cb6f54d
-
SHA256
da0d2e3d03a4c5096ba4b4325c53b66093c2c8de07bf11fdd0aa1ef6212e158c
-
SHA512
132ec8d14f5702d9b1d8f09a3b1a8ffb194d9ae3354bb089dcbbda7feb5bc7d252df7926f84145c1bf388a63489f7330d704b12091313399a0c36a78ab3af20d
-
SSDEEP
768:hfZYvZxNZ/SPjiUv0w0zyIvfgJy2LHRfbXUa9q3UEL2qEK5J6OAsNTGjf2tl8XOE:CPtQjiZVcykHRDgL15J6RN2tA5
Malware Config
Extracted
Family
mirai
Botnet
SORA
Signatures
-
Reads runtime system information 1 IoCs
Reads data from /proc virtual filesystem.
Processes:
da0d2e3d03a4c5096ba4b4325c53b66093c2c8de07bf11fdd0aa1ef6212e158c.elfdescription ioc process File opened for reading /proc/self/exe da0d2e3d03a4c5096ba4b4325c53b66093c2c8de07bf11fdd0aa1ef6212e158c.elf