Analysis
-
max time kernel
0s -
platform
debian-9_armhf -
resource
debian9-armhf-20240226-en -
resource tags
arch:armhfimage:debian9-armhf-20240226-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem -
submitted
19-03-2024 16:35
General
-
Target
f593e5922bb1ef9eab437e49dcef73d0.elf
-
Size
23KB
-
MD5
f593e5922bb1ef9eab437e49dcef73d0
-
SHA1
7cf6e9bfc2b6d29c623f0bad7bff1e3e649c8475
-
SHA256
e066ae17558b918618da04231c17088011b052e438203901aba63fe1105ac050
-
SHA512
7ae6b7e8cbb7ff8421281f2c7de06d18025dfdda7b32cf2d02e72a41f6bb4e1958d8ecd28b56e33d3ad6a172c4c275f1d052ce84abd3fa943b9733b6a3c05844
-
SSDEEP
384:APS6qjCYugUMyV2zknBDqR36Z9sYU9BtyvGMUkgd0aacEk3zh7qmdGUEpiaK1:e8CYugOxnBDqh6PslbtyOMUkgdfacEkJ
Malware Config
Extracted
Family
mirai
Botnet
SORA
Signatures
-
Reads runtime system information 1 IoCs
Reads data from /proc virtual filesystem.
Processes:
f593e5922bb1ef9eab437e49dcef73d0.elfdescription ioc process File opened for reading /proc/self/exe f593e5922bb1ef9eab437e49dcef73d0.elf
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/655-1-0x00008000-0x0002673c-memory.dmp