Analysis
-
max time kernel
0s -
platform
debian-9_armhf -
resource
debian9-armhf-20240226-en -
resource tags
arch:armhfimage:debian9-armhf-20240226-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem -
submitted
22-03-2024 03:04
General
-
Target
9508c55a3f45af702873d1f03ecbc20a890963f1713ce398c5470fe8eba9789d.elf
-
Size
32KB
-
MD5
e4ca0028e0694ac07ec6218959794eb0
-
SHA1
dbdab785bd99f679d38f41ef54c90eb373b31009
-
SHA256
9508c55a3f45af702873d1f03ecbc20a890963f1713ce398c5470fe8eba9789d
-
SHA512
25bb6d0afe3dfc8390943b579c66f5f1c1d59bc40c9391b5e2b7b7f5d5a19095204e8dc0e694840a5ce30d3c3ce1a5d644ba1914e6e3720f66991b87a73a56c1
-
SSDEEP
768:uoiWiO031vpAPbrVWZK3XVGxm9XiO9q3UEL5Io:uorm1vpALgUJcL/
Malware Config
Extracted
Family
mirai
Botnet
SORA
Signatures
-
Reads runtime system information 1 IoCs
Reads data from /proc virtual filesystem.
Processes:
9508c55a3f45af702873d1f03ecbc20a890963f1713ce398c5470fe8eba9789d.elfdescription ioc process File opened for reading /proc/self/exe 9508c55a3f45af702873d1f03ecbc20a890963f1713ce398c5470fe8eba9789d.elf