Analysis

  • max time kernel
    0s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20240226-en
  • resource tags

    arch:armhfimage:debian9-armhf-20240226-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    21-03-2024 06:53

General

  • Target

    b1fbd3320302545ee6f2ce1640d406df.elf

  • Size

    18KB

  • MD5

    b1fbd3320302545ee6f2ce1640d406df

  • SHA1

    1399321941bd753083b7d89fb58beaf44a1a4a61

  • SHA256

    c89b936f9d5a2c9637f06aa93ed8e71aabbde8c2dcccd3abcd7a6e661a94735c

  • SHA512

    7326e60219cd017b65049985c4a79b105d7c767152dac2f89b7a52499211d8b8c57c8e77144faab5af58de303e91e065ecf3b41bd8cc115463439ebd29f4dd16

  • SSDEEP

    384:MjlzRV0P6iOwrkom0DRnVATuSlShu6NvmPWtUn+KManhymdGUop5h5la:6/V0P6+kom0tVAoNvm+to1ns3Uoznla

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

Processes

  • /tmp/b1fbd3320302545ee6f2ce1640d406df.elf
    /tmp/b1fbd3320302545ee6f2ce1640d406df.elf
    1⤵
      PID:648

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/648-1-0x00008000-0x0001b6e4-memory.dmp