Analysis

  • max time kernel
    0s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20240226-en
  • resource tags

    arch:armhfimage:debian9-armhf-20240226-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    14-04-2024 01:25

General

  • Target

    6af0d8cd3a54f95bdb7795186ba132eb550e4b192edbbadbc4c845539f494c0c.elf

  • Size

    24KB

  • MD5

    c0fec76a502f912007ef866e4d09342b

  • SHA1

    504f39c16a6891475d97849bdd88000c13cbeba7

  • SHA256

    6af0d8cd3a54f95bdb7795186ba132eb550e4b192edbbadbc4c845539f494c0c

  • SHA512

    85d6f80758c756b8cb5ee9a341fc57c5d1ae307037853ae08e834cc440acd764258a35e3027f7347dda60f382e183069928e13b0b962647feb0cb8e84c9ba055

  • SSDEEP

    768:ZIIZPxCLg/z0ibC54c+TtfpzuprUs+19q3UEL5U:ZIIZPQL60ibttfpC9Us+IL5U

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

Processes

  • /tmp/6af0d8cd3a54f95bdb7795186ba132eb550e4b192edbbadbc4c845539f494c0c.elf
    /tmp/6af0d8cd3a54f95bdb7795186ba132eb550e4b192edbbadbc4c845539f494c0c.elf
    1⤵
      PID:661

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/661-1-0x00008000-0x0001e5a4-memory.dmp