Analysis
-
max time kernel
0s -
platform
debian-9_armhf -
resource
debian9-armhf-20240226-en -
resource tags
arch:armhfimage:debian9-armhf-20240226-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem -
submitted
22-03-2024 03:17
General
-
Target
bbc45c737d0b7f36e4f33f5ec7cddda7a44826e4f5a5a2af71e8f96f84f7bb6f.elf
-
Size
26KB
-
MD5
57f121a68d7cae498b47ad9a68ea201c
-
SHA1
630b6184881026cfdaa8e9cccbfed5101eb74178
-
SHA256
bbc45c737d0b7f36e4f33f5ec7cddda7a44826e4f5a5a2af71e8f96f84f7bb6f
-
SHA512
b0c7e33b35a5ea4754303b6e73f779d9f80a4b5e3e04606bb989ed7dbff689b3b9a0c2ae722651c4681491382b405e056f71f7f2fc2e09639366f2e663d4e38f
-
SSDEEP
768:eMKyhegCCMqfizjoNpd2vJdX6vwr/g+9q3UELuF:NKy4qfqoeJdXWgojLg
Malware Config
Extracted
Family
mirai
Botnet
LZRD
Signatures
-
Reads runtime system information 1 IoCs
Reads data from /proc virtual filesystem.
Processes:
bbc45c737d0b7f36e4f33f5ec7cddda7a44826e4f5a5a2af71e8f96f84f7bb6f.elfdescription ioc process File opened for reading /proc/self/exe bbc45c737d0b7f36e4f33f5ec7cddda7a44826e4f5a5a2af71e8f96f84f7bb6f.elf