Analysis
-
max time kernel
0s -
platform
debian-9_armhf -
resource
debian9-armhf-20240226-en -
resource tags
arch:armhfimage:debian9-armhf-20240226-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem -
submitted
18-03-2024 02:29
General
-
Target
d8dfe3062e531a9dfbf99bf6ee53a86d479ab5d419d0737c77a07045211d9bcd.elf
-
Size
27KB
-
MD5
064da2e470badbdeb24125c40ed7f639
-
SHA1
4657b9f5013daea1346a634d754242e8b16a4501
-
SHA256
d8dfe3062e531a9dfbf99bf6ee53a86d479ab5d419d0737c77a07045211d9bcd
-
SHA512
9e58350c7cbc4b65533e3bbd4297d9879db331234b2b4aee16dd7d308bf59b5cef29c40bc0a84a3b76bb80fc7d0aaaa8c3d90224e585a980bcc171558188bfea
-
SSDEEP
384:ARt/koxisa34beDtZwuaCBsk+G9lLSsLYSTFs9u8OtqlrNE6LyhymdGUop5hrg:A7soTAZ3alkXLvFh8nNE6Lys3Uoz9g
Malware Config
Extracted
Family
mirai
Botnet
SORA
Signatures
-
Reads runtime system information 1 IoCs
Reads data from /proc virtual filesystem.
Processes:
d8dfe3062e531a9dfbf99bf6ee53a86d479ab5d419d0737c77a07045211d9bcd.elfdescription ioc process File opened for reading /proc/self/exe d8dfe3062e531a9dfbf99bf6ee53a86d479ab5d419d0737c77a07045211d9bcd.elf
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/637-1-0x00008000-0x00020ffc-memory.dmp