Analysis
-
max time kernel
0s -
platform
debian-9_armhf -
resource
debian9-armhf-20240226-en -
resource tags
arch:armhfimage:debian9-armhf-20240226-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem -
submitted
18-04-2024 05:04
General
-
Target
e2765beb0f46bf29ac6eacff880015e7.elf
-
Size
50KB
-
MD5
e2765beb0f46bf29ac6eacff880015e7
-
SHA1
2896ff683798cf0bf6ff8746bcb383a60af0728f
-
SHA256
c405d0997b3a689aeccbf324693ffda128ce17011474c758fdf7f8c7afa11140
-
SHA512
26c6e715d18841b521c0573e464756ee161cb2cffb6954607d49ac53519529878ea685b922229050daf3477752d580db08c14cf126a3710c4b35a5f33ed62bda
-
SSDEEP
768:vfZYvZxNZ/SPjiUv0w0zyIvfgJy2LHRfbMK59q3UEL2qEK5J6OAsNTGjf2tl8XO8:0PtQjiZVcykHRDMbL15J6RN2tAt
Malware Config
Extracted
Family
mirai
Botnet
SORA
Signatures
-
Reads runtime system information 1 IoCs
Reads data from /proc virtual filesystem.
Processes:
e2765beb0f46bf29ac6eacff880015e7.elfdescription ioc process File opened for reading /proc/self/exe e2765beb0f46bf29ac6eacff880015e7.elf