Analysis

  • max time kernel
    0s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20240226-en
  • resource tags

    arch:armhfimage:debian9-armhf-20240226-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    10-04-2024 06:56

General

  • Target

    1bae581cfc8d0b1d68c8ad27f5a966af.elf

  • Size

    17KB

  • MD5

    1bae581cfc8d0b1d68c8ad27f5a966af

  • SHA1

    26d2a6813a7a8b00fb4961158f014d9a1aead2b9

  • SHA256

    7f9c06a5d2efe1c02971f78ad428ad7b3160e61d20c5ddbdba979c86922c58f4

  • SHA512

    294bf05a7b188413f5c5c4f0da301b48920fabbe4742cb2a1f4bb3c71f687c73b71d595f2a214fc6b5106d1104a56d8edf4e7b054d84c12f43fd2ec3dca570b0

  • SSDEEP

    384:28Ksm9ovaLX7ZA0xNj9HYURlJTO6moXTcStr3Oh7qmdGUEpiaNV:2X9ov2xJFRy6m2THr3O9q3UELz

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

Processes

  • /tmp/1bae581cfc8d0b1d68c8ad27f5a966af.elf
    /tmp/1bae581cfc8d0b1d68c8ad27f5a966af.elf
    1⤵
      PID:654

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/654-1-0x00008000-0x0001ac4c-memory.dmp