Analysis

  • max time kernel
    0s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20240226-en
  • resource tags

    arch:armhfimage:debian9-armhf-20240226-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    16-04-2024 01:00

General

  • Target

    011427141a39fb519c11a487fb22accc368c090bf8f017b579600b470782c0a9.elf

  • Size

    22KB

  • MD5

    1beb3c1546882213db211fd5e7c218bb

  • SHA1

    740c16397aee8e04844beaaf37f212ab19d1a8dc

  • SHA256

    011427141a39fb519c11a487fb22accc368c090bf8f017b579600b470782c0a9

  • SHA512

    ccd1af6fbe46036fc99aface9fdfb28b0a9e79fe1c8283655398fe4f9be6fcc8caa1badd29cfdcf85a8fefdd2c9f6ca8671f9416422eddd4fdf4d940935b170a

  • SSDEEP

    384:/XLipjSPrNEbcSCE0CWmJWtaI6/ZmZfij8TMvn6DOA6hfyh7qmdGUEpiaao:PLcSPNvUZmZfijQMvnIO55y9q3UELp

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

SORA

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

Processes

  • /tmp/011427141a39fb519c11a487fb22accc368c090bf8f017b579600b470782c0a9.elf
    /tmp/011427141a39fb519c11a487fb22accc368c090bf8f017b579600b470782c0a9.elf
    1⤵
      PID:670

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/670-1-0x00008000-0x0001df2c-memory.dmp