Analysis

  • max time kernel
    0s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20240226-en
  • resource tags

    arch:armhfimage:debian9-armhf-20240226-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    19-03-2024 16:35

General

  • Target

    f593e5922bb1ef9eab437e49dcef73d0.elf

  • Size

    23KB

  • MD5

    f593e5922bb1ef9eab437e49dcef73d0

  • SHA1

    7cf6e9bfc2b6d29c623f0bad7bff1e3e649c8475

  • SHA256

    e066ae17558b918618da04231c17088011b052e438203901aba63fe1105ac050

  • SHA512

    7ae6b7e8cbb7ff8421281f2c7de06d18025dfdda7b32cf2d02e72a41f6bb4e1958d8ecd28b56e33d3ad6a172c4c275f1d052ce84abd3fa943b9733b6a3c05844

  • SSDEEP

    384:APS6qjCYugUMyV2zknBDqR36Z9sYU9BtyvGMUkgd0aacEk3zh7qmdGUEpiaK1:e8CYugOxnBDqh6PslbtyOMUkgdfacEkJ

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

SORA

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Reads runtime system information 1 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/f593e5922bb1ef9eab437e49dcef73d0.elf
    /tmp/f593e5922bb1ef9eab437e49dcef73d0.elf
    1⤵
    • Reads runtime system information
    PID:655

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/655-1-0x00008000-0x0002673c-memory.dmp