Analysis
-
max time kernel
0s -
platform
debian-9_armhf -
resource
debian9-armhf-20240226-en -
resource tags
arch:armhfimage:debian9-armhf-20240226-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem -
submitted
24-03-2024 07:30
General
-
Target
378730f6eaf90a1ac6026cb740ce09ca.elf
-
Size
33KB
-
MD5
378730f6eaf90a1ac6026cb740ce09ca
-
SHA1
8c9b5e904c3856540c2caf90aa7e16f74318ca7c
-
SHA256
74a12c37da10a28d879a3a4517d63b91ea4e06df2cacdbe5722350f398ce3fe2
-
SHA512
4356faf84787fdcd49b56a6fcc7590102688e96a29e333c73ad6c654d371f7c3086e59474e6ffdc69669dd6755e4972674f4114e9dcbe5d8f3c6ad88a66bf829
-
SSDEEP
768:qu9YDJSsqL8dTvlz+kZaJftXp/KJxrKu+lmLSZn9i3ks9q3UELCK:qu9CgsqL8dTlqk41tXp/K/5+sLF3wLV
Malware Config
Extracted
Family
mirai
Botnet
LZRD
Signatures
-
Reads runtime system information 1 IoCs
Reads data from /proc virtual filesystem.
Processes:
378730f6eaf90a1ac6026cb740ce09ca.elfdescription ioc process File opened for reading /proc/self/exe 378730f6eaf90a1ac6026cb740ce09ca.elf