Analysis
-
max time kernel
0s -
max time network
147s -
platform
debian-12_armhf -
resource
debian12-armhf-20240729-en -
resource tags
arch:armhfimage:debian12-armhf-20240729-enkernel:6.1.0-17-armmp-lpaelocale:en-usos:debian-12-armhfsystem -
submitted
03-08-2024 01:53
General
-
Target
2ff8bb5aee854145724fc179b6f42772074e2cb768eb2c949f8691aee6aa6df8.elf
-
Size
31KB
-
MD5
4bd2421073a3037f7ac1de974ece2718
-
SHA1
dddcd54fc3355c96b32414c45876b7e8272a9df9
-
SHA256
2ff8bb5aee854145724fc179b6f42772074e2cb768eb2c949f8691aee6aa6df8
-
SHA512
1cd82cea3154740a26fa632291c8c3ea8abb8bf18fcd7adb262be4cfba8a5632a9d1881b05afe71dcc646803fc4bbaeb8b6633fa142ffa21720ebe1ca6cdd013
-
SSDEEP
768:wEKkUgXAnURCr6HmDFStmYtsUM9q3UELdZ:IkEn7uHEemkVL7
Malware Config
Extracted
Family
mirai
Botnet
SORA
Signatures
-
Reads runtime system information 1 IoCs
Reads data from /proc virtual filesystem.
Processes:
2ff8bb5aee854145724fc179b6f42772074e2cb768eb2c949f8691aee6aa6df8.elfdescription ioc process File opened for reading /proc/self/exe 2ff8bb5aee854145724fc179b6f42772074e2cb768eb2c949f8691aee6aa6df8.elf