Analysis

  • max time kernel
    0s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20240226-en
  • resource tags

    arch:armhfimage:debian9-armhf-20240226-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    18-03-2024 02:29

General

  • Target

    d8dfe3062e531a9dfbf99bf6ee53a86d479ab5d419d0737c77a07045211d9bcd.elf

  • Size

    27KB

  • MD5

    064da2e470badbdeb24125c40ed7f639

  • SHA1

    4657b9f5013daea1346a634d754242e8b16a4501

  • SHA256

    d8dfe3062e531a9dfbf99bf6ee53a86d479ab5d419d0737c77a07045211d9bcd

  • SHA512

    9e58350c7cbc4b65533e3bbd4297d9879db331234b2b4aee16dd7d308bf59b5cef29c40bc0a84a3b76bb80fc7d0aaaa8c3d90224e585a980bcc171558188bfea

  • SSDEEP

    384:ARt/koxisa34beDtZwuaCBsk+G9lLSsLYSTFs9u8OtqlrNE6LyhymdGUop5hrg:A7soTAZ3alkXLvFh8nNE6Lys3Uoz9g

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

SORA

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Reads runtime system information 1 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/d8dfe3062e531a9dfbf99bf6ee53a86d479ab5d419d0737c77a07045211d9bcd.elf
    /tmp/d8dfe3062e531a9dfbf99bf6ee53a86d479ab5d419d0737c77a07045211d9bcd.elf
    1⤵
    • Reads runtime system information
    PID:637

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/637-1-0x00008000-0x00020ffc-memory.dmp