Analysis

  • max time kernel
    0s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20240226-en
  • resource tags

    arch:armhfimage:debian9-armhf-20240226-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    25-03-2024 02:11

General

  • Target

    5afd4216921f55f063471a3d7b100fb6c8c43bb6191b1bfbc8b230b730ad948a.elf

  • Size

    25KB

  • MD5

    19393f627920eb5348d880f7df5585ec

  • SHA1

    f84d556cdf7576f33697553765f63161c7604f68

  • SHA256

    5afd4216921f55f063471a3d7b100fb6c8c43bb6191b1bfbc8b230b730ad948a

  • SHA512

    87c5fb83d6954b6e966ad8c13ee43b1d619736da8def4b79cd4191b5f73386b7f9156e964d856e09c400c1d8309b9cf003c6ecd1719ae8bd9be3cfe8039bff41

  • SSDEEP

    768:HRYtLOjiI0iTehHr6qiLGOXQJYu5RZMJbvbs3UozG9:Hat9wALKGlYu5RZM1vGzc

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

Processes

  • /tmp/5afd4216921f55f063471a3d7b100fb6c8c43bb6191b1bfbc8b230b730ad948a.elf
    /tmp/5afd4216921f55f063471a3d7b100fb6c8c43bb6191b1bfbc8b230b730ad948a.elf
    1⤵
      PID:660

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/660-1-0x00008000-0x0001ee3c-memory.dmp