Analysis
-
max time kernel
0s -
platform
debian-9_armhf -
resource
debian9-armhf-20240226-en -
resource tags
arch:armhfimage:debian9-armhf-20240226-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem -
submitted
14-04-2024 01:47
General
-
Target
e947cf20912328d0f71c32898d517cfabf65e0b8f0ff0eaa1cec89e5f8700555.elf
-
Size
31KB
-
MD5
33c0031f2faedfb798165d0b6a435bd0
-
SHA1
2ff201138d75e38fc9f954a04f5451adf02e73a2
-
SHA256
e947cf20912328d0f71c32898d517cfabf65e0b8f0ff0eaa1cec89e5f8700555
-
SHA512
e3afee904996f901959ac26fb47c5d5826d37f0bc11523fef36b4002252b14a7e234f3ffc874cc32aae994709a8bd4c107989dfa297f71462938cd92fcadf234
-
SSDEEP
384:BSBehsL5wFgC4Urp3VvZhUzaAfVGbrc2/pkTNW7CQRkPgosmkyCizUs1UeDhymdk:okh3G0p3VhUHqvKT4Fc9pJs3UozRL
Malware Config
Extracted
Family
mirai
Botnet
SORA
Signatures
-
Reads runtime system information 1 IoCs
Reads data from /proc virtual filesystem.
Processes:
e947cf20912328d0f71c32898d517cfabf65e0b8f0ff0eaa1cec89e5f8700555.elfdescription ioc process File opened for reading /proc/self/exe e947cf20912328d0f71c32898d517cfabf65e0b8f0ff0eaa1cec89e5f8700555.elf
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/654-1-0x00008000-0x000267cc-memory.dmp