Analysis

  • max time kernel
    0s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20240418-en
  • resource tags

    arch:armhfimage:debian9-armhf-20240418-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    03/07/2024, 07:39

General

  • Target

    arm7

  • Size

    63KB

  • MD5

    1fae926e46ca59a9ba2a030ea578bfe5

  • SHA1

    5553aa2bc7cc8b77e16f86845f105f6e52e66251

  • SHA256

    5814707b0a99f0aa3a25ede2d2794ae2cba85cb7ebbd513ad038885e097ba91e

  • SHA512

    9d51bce71c3e0fb85b34e407904c28809af07c6862ae2855c95097afceb90aff829155958474b8d8c13c57c1b2d37bf01abc3eed91c82a118b2e040b5b831dfa

  • SSDEEP

    1536:6EEOL68aUIa21OZoMhQciVdZHD4JbunVh+Me:6fU6RdIe5HDUcKMe

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

MIRAI

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Reads runtime system information 1 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/arm7
    /tmp/arm7
    1⤵
    • Reads runtime system information
    PID:647

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads