Analysis
-
max time kernel
1s -
platform
debian-9_mips -
resource
debian9-mipsbe-20240226-en -
resource tags
arch:mipsimage:debian9-mipsbe-20240226-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipssystem -
submitted
09-04-2024 01:27
General
-
Target
53ad810c68987f5d0da2a88d0f1b869088a67d647dcff9256583ef45e34dc282.elf
-
Size
35KB
-
MD5
8855eb909c2c42d3999f4f54f2bad695
-
SHA1
71de5a85f141461e476d1c7299e65d5f3baa5f2d
-
SHA256
53ad810c68987f5d0da2a88d0f1b869088a67d647dcff9256583ef45e34dc282
-
SHA512
098174f434cbb357647ffef5dcca2d019b9dd2055e5ac6a3e6b8bf3bcac79d26956c874012975d4ad3232d17347a8012a3c427af3172b24d4ab8657dbf7d6427
-
SSDEEP
768:WLTNy/4Rc2U07O8/jRN65B88Y2FVvZ/c+CkDz1ZEdrJgGlzDpUYsf:e5y4RDL7/r65B88Y23Z/c+CSzYdhVqYg
Malware Config
Extracted
Family
mirai
Botnet
MIRAI
Signatures
-
Reads runtime system information 1 IoCs
Reads data from /proc virtual filesystem.
Processes:
53ad810c68987f5d0da2a88d0f1b869088a67d647dcff9256583ef45e34dc282.elfdescription ioc process File opened for reading /proc/self/exe 53ad810c68987f5d0da2a88d0f1b869088a67d647dcff9256583ef45e34dc282.elf