Analysis

  • max time kernel
    0s
  • max time network
    151s
  • platform
    debian-12_armhf
  • resource
    debian12-armhf-20240418-en
  • resource tags

    arch:armhfimage:debian12-armhf-20240418-enkernel:6.1.0-17-armmp-lpaelocale:en-usos:debian-12-armhfsystem
  • submitted
    23-07-2024 01:49

General

  • Target

    3a5087d3b18397ae5ada6022039446d4aa3a6524efe4b3e464ff194583628be9.elf

  • Size

    26KB

  • MD5

    32666457f33a374a1c71f6dd24676710

  • SHA1

    de0e107b9dd784f1695edb8a74bf1f73e258ff80

  • SHA256

    3a5087d3b18397ae5ada6022039446d4aa3a6524efe4b3e464ff194583628be9

  • SHA512

    40bdb9443418e3cf9901c17e258c9fc6a183b82f68926ed74fe8d55242e04fa3c4ab9f3417ca9d36d91ac48ae538b51830d1c7c8de59f7cb0274adebd4faa048

  • SSDEEP

    768:xV8Yjg8RU8b4255UmJ9oG9J2iNU9q3UELuM:HZjg8RLl5voG9JN9Lx

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Reads runtime system information 1 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/3a5087d3b18397ae5ada6022039446d4aa3a6524efe4b3e464ff194583628be9.elf
    /tmp/3a5087d3b18397ae5ada6022039446d4aa3a6524efe4b3e464ff194583628be9.elf
    1⤵
    • Reads runtime system information
    PID:703

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads