Analysis

  • max time kernel
    0s
  • platform
    debian-9_mips
  • resource
    debian9-mipsbe-20240226-en
  • resource tags

    arch:mipsimage:debian9-mipsbe-20240226-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipssystem
  • submitted
    24-04-2024 01:18

General

  • Target

    3a5ceb0855bfd0d5d0cbb73c76ad765e344c2e13ef7ebe51032b41b7fc1ff2c6.elf

  • Size

    41KB

  • MD5

    21905533689aa3f91b7c941cf7733976

  • SHA1

    216fa24f9e5617ed1cbebd4beaeccd03a4a4af9c

  • SHA256

    3a5ceb0855bfd0d5d0cbb73c76ad765e344c2e13ef7ebe51032b41b7fc1ff2c6

  • SHA512

    bd758ffb6407ebb87f73474d64d318adea85800f7f309726cbcf434c79707b48f3317486b53ddad98782eb55c4845e0c5b54e83cdae6da92023f5e29f8337f78

  • SSDEEP

    768:hmYeHkVM05QH0RievhI4dWjiksLtJWCU71A9xaSo5F1kJgGlzDpUYsY:LZC0r3ZI4dWjFsR629IpuVqYb

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

MIRAI

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Reads runtime system information 1 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/3a5ceb0855bfd0d5d0cbb73c76ad765e344c2e13ef7ebe51032b41b7fc1ff2c6.elf
    /tmp/3a5ceb0855bfd0d5d0cbb73c76ad765e344c2e13ef7ebe51032b41b7fc1ff2c6.elf
    1⤵
    • Reads runtime system information
    PID:712

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/712-1-0x00400000-0x0046d2f8-memory.dmp