Analysis

  • max time kernel
    1s
  • platform
    debian-9_mipsel
  • resource
    debian9-mipsel-20240226-en
  • resource tags

    arch:mipselimage:debian9-mipsel-20240226-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipselsystem
  • submitted
    09-04-2024 01:32

General

  • Target

    65c9f90bcff850a53e5e883e051a996259486c688560293f5af827b06c65e59d.elf

  • Size

    36KB

  • MD5

    ad164831a68daad95420b28fa37178dc

  • SHA1

    51d082d4e0184d4e552ec089882eaadbda62cbc5

  • SHA256

    65c9f90bcff850a53e5e883e051a996259486c688560293f5af827b06c65e59d

  • SHA512

    20d7b650f5ba10467220d797e41474faf6ef50fd734b9164841d17f026583a97ac9d5b4760bfba7b32a460501089c8ea727b9c926d20620fc557e39400977a2f

  • SSDEEP

    768:PsLL8nyT3XHqMHekZaFK+zwNIlbKzWMQj:KLcyTu+NxNI17

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

MIRAI

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Reads runtime system information 1 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/65c9f90bcff850a53e5e883e051a996259486c688560293f5af827b06c65e59d.elf
    /tmp/65c9f90bcff850a53e5e883e051a996259486c688560293f5af827b06c65e59d.elf
    1⤵
    • Reads runtime system information
    PID:704

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/704-1-0x00400000-0x004596d8-memory.dmp