Analysis

  • max time kernel
    1s
  • platform
    debian-9_mips
  • resource
    debian9-mipsbe-20240226-en
  • resource tags

    arch:mipsimage:debian9-mipsbe-20240226-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipssystem
  • submitted
    09-04-2024 01:27

General

  • Target

    53ad810c68987f5d0da2a88d0f1b869088a67d647dcff9256583ef45e34dc282.elf

  • Size

    35KB

  • MD5

    8855eb909c2c42d3999f4f54f2bad695

  • SHA1

    71de5a85f141461e476d1c7299e65d5f3baa5f2d

  • SHA256

    53ad810c68987f5d0da2a88d0f1b869088a67d647dcff9256583ef45e34dc282

  • SHA512

    098174f434cbb357647ffef5dcca2d019b9dd2055e5ac6a3e6b8bf3bcac79d26956c874012975d4ad3232d17347a8012a3c427af3172b24d4ab8657dbf7d6427

  • SSDEEP

    768:WLTNy/4Rc2U07O8/jRN65B88Y2FVvZ/c+CkDz1ZEdrJgGlzDpUYsf:e5y4RDL7/r65B88Y23Z/c+CSzYdhVqYg

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

MIRAI

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Reads runtime system information 1 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/53ad810c68987f5d0da2a88d0f1b869088a67d647dcff9256583ef45e34dc282.elf
    /tmp/53ad810c68987f5d0da2a88d0f1b869088a67d647dcff9256583ef45e34dc282.elf
    1⤵
    • Reads runtime system information
    PID:704

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/704-1-0x00400000-0x004591e8-memory.dmp