Analysis

  • max time kernel
    0s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20240226-en
  • resource tags

    arch:armhfimage:debian9-armhf-20240226-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    07-04-2024 01:02

General

  • Target

    0fb017090f63d121a037a42b128a3cd3da2b422b87a8c7279c8cafb66287a2d1.elf

  • Size

    31KB

  • MD5

    9507246be924d9403be907f4d60b3735

  • SHA1

    423a30c65c8003acec72349d25bdeb71d0a047d0

  • SHA256

    0fb017090f63d121a037a42b128a3cd3da2b422b87a8c7279c8cafb66287a2d1

  • SHA512

    43e91496d7f790207b57e089c06bbc6638daf65db4daa2ed3c19b5f66da7305e9d063fc2f3e7c0477a2a0007f633e91368c38cbfbd8c92f4a1629f0748a99a6f

  • SSDEEP

    768:qEKkUgXAnURCr6HmDFStmYtOFE9q3UELdb:CkEn7uHEemLtL5

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

SORA

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Reads runtime system information 1 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/0fb017090f63d121a037a42b128a3cd3da2b422b87a8c7279c8cafb66287a2d1.elf
    /tmp/0fb017090f63d121a037a42b128a3cd3da2b422b87a8c7279c8cafb66287a2d1.elf
    1⤵
    • Reads runtime system information
    PID:654

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/654-1-0x00008000-0x0002da94-memory.dmp