Analysis

  • max time kernel
    0s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20240226-en
  • resource tags

    arch:armhfimage:debian9-armhf-20240226-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    13-03-2024 18:53

General

  • Target

    c69fb917ce44ecdafc1d1949ee9466c9

  • Size

    47KB

  • MD5

    c69fb917ce44ecdafc1d1949ee9466c9

  • SHA1

    637a97a8a1e23f7da982cab5656a254b35d11ccd

  • SHA256

    98f292ed65744f0553735539a982c5e5c5fe42607d43c4d8269159e2c44f789c

  • SHA512

    f908e0ac0b7fcaa3972f56c515b20866f2f3275daa78bb4146f1c6c23b374b4304666aeab209d5a3133676800a6f4559d95850e8288fc059d18de2494a903352

  • SSDEEP

    768:aK7y1XGO1LCNgukEkvwtqPnH7u83nc0iFHZ9q3UELWt/iw+kvBGg6+fYtrBHW:E12O1LCNguovDPH7TcrlMLWhiw+kvBGw

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

SORA

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Reads runtime system information 1 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/c69fb917ce44ecdafc1d1949ee9466c9
    /tmp/c69fb917ce44ecdafc1d1949ee9466c9
    1⤵
    • Reads runtime system information
    PID:660

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads