Analysis
-
max time kernel
0s -
platform
debian-9_armhf -
resource
debian9-armhf-20240226-en -
resource tags
arch:armhfimage:debian9-armhf-20240226-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem -
submitted
22-03-2024 02:58
General
-
Target
8833f325154c7a6e0007894e05c6f4000f8bb86a26d76bc676f10154d8ebd4ec.elf
-
Size
26KB
-
MD5
7aced0ac8b7e2a3d2e84ca32476a4751
-
SHA1
722cc0dbfff06a1f81ae6185e6509ca71417a9ce
-
SHA256
8833f325154c7a6e0007894e05c6f4000f8bb86a26d76bc676f10154d8ebd4ec
-
SHA512
9d7234d2aeee38309cd16dda79c4aaba03f2ef38e29a49c905d8577845339f47cebc5dad1acecf80e9e6a20907a323546c09f021229fea4271cb250297937c3e
-
SSDEEP
768:7MKyhegCCMqfN11zqcEobtfUxYaOsT9q3UEL31:QKy4qf7ISPaULF
Malware Config
Extracted
Family
mirai
Botnet
LZRD
Signatures
-
Reads runtime system information 1 IoCs
Reads data from /proc virtual filesystem.
Processes:
8833f325154c7a6e0007894e05c6f4000f8bb86a26d76bc676f10154d8ebd4ec.elfdescription ioc process File opened for reading /proc/self/exe 8833f325154c7a6e0007894e05c6f4000f8bb86a26d76bc676f10154d8ebd4ec.elf