Analysis
-
max time kernel
0s -
platform
debian-9_armhf -
resource
debian9-armhf-20240226-en -
resource tags
arch:armhfimage:debian9-armhf-20240226-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem -
submitted
02-04-2024 01:17
General
-
Target
a216c05b201d5586208af929795cb944aa883aa8db9ba9c1b40df1a11ee3f8a1.elf
-
Size
26KB
-
MD5
cb6d04beddae662745e81aa5ecced571
-
SHA1
0ba0614065a401c2282066e96a4c2ebef66e1134
-
SHA256
a216c05b201d5586208af929795cb944aa883aa8db9ba9c1b40df1a11ee3f8a1
-
SHA512
0c547986db1ff71821a4dc99a7ee4501cc826ec47666fec23be1d55e9918c8d562285c413813f1f32c930fed9fdf42fd2ef5bb804845c917a6880b2c439ce02b
-
SSDEEP
768:YYIiyWMqFTKlQNV5qws9AO9fYBxDBs3UozY:YFiyWMqFTKlQ4v6OqdszY
Malware Config
Extracted
Family
mirai
Botnet
SORA
Signatures
-
Reads runtime system information 1 IoCs
Reads data from /proc virtual filesystem.
Processes:
a216c05b201d5586208af929795cb944aa883aa8db9ba9c1b40df1a11ee3f8a1.elfdescription ioc process File opened for reading /proc/self/exe a216c05b201d5586208af929795cb944aa883aa8db9ba9c1b40df1a11ee3f8a1.elf