Analysis

  • max time kernel
    0s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20240226-en
  • resource tags

    arch:armhfimage:debian9-armhf-20240226-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    19-04-2024 01:17

General

  • Target

    42de2071f8cf51ff9dba04feb84ad342461300cdcbea7e18c55f112d3a648d36.elf

  • Size

    22KB

  • MD5

    ffa14b284d5f05107608d3c20a97b7de

  • SHA1

    4578161986cc5a0471e996a4fa626619ddf30687

  • SHA256

    42de2071f8cf51ff9dba04feb84ad342461300cdcbea7e18c55f112d3a648d36

  • SHA512

    43928e5327f562cf53b9926ee01ef53c9b379a72f3eb079bdaebd5b709d9b3cdf8840499c772f5b7dcd01f0c122fe1f0558b7d85d270bf741575a34bf1097c0e

  • SSDEEP

    384:lBx65lmnprlxorHVkmyn6qpyGUf3dD3bksZ5YILCDobdnTUsh7qmdGUEpia5G:lBx0lQpROWm0JwnPB3bkQ5YuJbdQs9qG

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

SORA

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

Processes

  • /tmp/42de2071f8cf51ff9dba04feb84ad342461300cdcbea7e18c55f112d3a648d36.elf
    /tmp/42de2071f8cf51ff9dba04feb84ad342461300cdcbea7e18c55f112d3a648d36.elf
    1⤵
      PID:654

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/654-1-0x00008000-0x0001df28-memory.dmp