Analysis
-
max time kernel
0s -
platform
debian-9_armhf -
resource
debian9-armhf-20240226-en -
resource tags
arch:armhfimage:debian9-armhf-20240226-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem -
submitted
28-03-2024 02:38
General
-
Target
d456e5b67c5ec2e5a9200f23cd03b040b4aa76533c5e89b3e977367316693803.elf
-
Size
26KB
-
MD5
b927784e3ab16429fa3b3d00b71dcf89
-
SHA1
645545f4eda3c10f1d1d0e2e7770419806fd9fdd
-
SHA256
d456e5b67c5ec2e5a9200f23cd03b040b4aa76533c5e89b3e977367316693803
-
SHA512
d8c38375a316c0342794f45c0d7b5fbbcfbea93386c4c78b44cff957ae502bc706f8fdd9cf129e985d09fbf976cfef1e3543896e2ff8aaf1c007fe68cebf9f83
-
SSDEEP
768:eMKyhegCCMqfizjoNpd2vJdX6vwryu9q3UELuz:NKy4qfqoeJdXWgyTLa
Malware Config
Extracted
Family
mirai
Botnet
LZRD
Signatures
-
Reads runtime system information 1 IoCs
Reads data from /proc virtual filesystem.
Processes:
d456e5b67c5ec2e5a9200f23cd03b040b4aa76533c5e89b3e977367316693803.elfdescription ioc process File opened for reading /proc/self/exe d456e5b67c5ec2e5a9200f23cd03b040b4aa76533c5e89b3e977367316693803.elf