Analysis
-
max time kernel
0s -
max time network
147s -
platform
debian-12_armhf -
resource
debian12-armhf-20240221-en -
resource tags
arch:armhfimage:debian12-armhf-20240221-enkernel:6.1.0-17-armmp-lpaelocale:en-usos:debian-12-armhfsystem -
submitted
01-08-2024 02:18
General
-
Target
df457fd41ccfd753073de7f4eeaca9b021c0603cf68701e6e8fedff61a544d3a.elf
-
Size
50KB
-
MD5
9d37c57ecc917b52c0cc69c0146c550f
-
SHA1
1a732546967aa30741b5e538ca0be4c17c63b6a0
-
SHA256
df457fd41ccfd753073de7f4eeaca9b021c0603cf68701e6e8fedff61a544d3a
-
SHA512
917f00130ffff8ec3e29f898858cdf046bbca78903b6a24646c6ebbbc47bd60467d5837d8fe4cc775ff2066baedf45a44faed8fcd0c589e840471be4b7425272
-
SSDEEP
1536:3CoqsGR4eB3g0Vmh1IxIpC8JFL9VE8amFZP7R3m:Soqs2Twh6P8JFLJ9ZP7R3m
Malware Config
Extracted
Family
mirai
Botnet
SORA
Signatures
-
Reads runtime system information 1 IoCs
Reads data from /proc virtual filesystem.
Processes:
df457fd41ccfd753073de7f4eeaca9b021c0603cf68701e6e8fedff61a544d3a.elfdescription ioc process File opened for reading /proc/self/exe df457fd41ccfd753073de7f4eeaca9b021c0603cf68701e6e8fedff61a544d3a.elf