Analysis
-
max time kernel
0s -
platform
debian-9_armhf -
resource
debian9-armhf-20240226-en -
resource tags
arch:armhfimage:debian9-armhf-20240226-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem -
submitted
07-04-2024 01:02
General
-
Target
0fb017090f63d121a037a42b128a3cd3da2b422b87a8c7279c8cafb66287a2d1.elf
-
Size
31KB
-
MD5
9507246be924d9403be907f4d60b3735
-
SHA1
423a30c65c8003acec72349d25bdeb71d0a047d0
-
SHA256
0fb017090f63d121a037a42b128a3cd3da2b422b87a8c7279c8cafb66287a2d1
-
SHA512
43e91496d7f790207b57e089c06bbc6638daf65db4daa2ed3c19b5f66da7305e9d063fc2f3e7c0477a2a0007f633e91368c38cbfbd8c92f4a1629f0748a99a6f
-
SSDEEP
768:qEKkUgXAnURCr6HmDFStmYtOFE9q3UELdb:CkEn7uHEemLtL5
Malware Config
Extracted
Family
mirai
Botnet
SORA
Signatures
-
Reads runtime system information 1 IoCs
Reads data from /proc virtual filesystem.
Processes:
0fb017090f63d121a037a42b128a3cd3da2b422b87a8c7279c8cafb66287a2d1.elfdescription ioc process File opened for reading /proc/self/exe 0fb017090f63d121a037a42b128a3cd3da2b422b87a8c7279c8cafb66287a2d1.elf