Analysis

  • max time kernel
    0s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20240226-en
  • resource tags

    arch:armhfimage:debian9-armhf-20240226-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    28-03-2024 02:38

General

  • Target

    d456e5b67c5ec2e5a9200f23cd03b040b4aa76533c5e89b3e977367316693803.elf

  • Size

    26KB

  • MD5

    b927784e3ab16429fa3b3d00b71dcf89

  • SHA1

    645545f4eda3c10f1d1d0e2e7770419806fd9fdd

  • SHA256

    d456e5b67c5ec2e5a9200f23cd03b040b4aa76533c5e89b3e977367316693803

  • SHA512

    d8c38375a316c0342794f45c0d7b5fbbcfbea93386c4c78b44cff957ae502bc706f8fdd9cf129e985d09fbf976cfef1e3543896e2ff8aaf1c007fe68cebf9f83

  • SSDEEP

    768:eMKyhegCCMqfizjoNpd2vJdX6vwryu9q3UELuz:NKy4qfqoeJdXWgyTLa

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Reads runtime system information 1 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/d456e5b67c5ec2e5a9200f23cd03b040b4aa76533c5e89b3e977367316693803.elf
    /tmp/d456e5b67c5ec2e5a9200f23cd03b040b4aa76533c5e89b3e977367316693803.elf
    1⤵
    • Reads runtime system information
    PID:639

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/639-1-0x00008000-0x000228c4-memory.dmp