Analysis

  • max time kernel
    0s
  • max time network
    150s
  • platform
    debian-12_armhf
  • resource
    debian12-armhf-20240221-en
  • resource tags

    arch:armhfimage:debian12-armhf-20240221-enkernel:6.1.0-17-armmp-lpaelocale:en-usos:debian-12-armhfsystem
  • submitted
    04/08/2024, 01:04

General

  • Target

    0aa4b24992c46a1512c04fef83835486ffaae82883a4829872aaed8c2f39f964.elf

  • Size

    24KB

  • MD5

    8514fbe08dbe43d76b41545803fede08

  • SHA1

    d56177f36ca296c9d27be61810440ea7aacab853

  • SHA256

    0aa4b24992c46a1512c04fef83835486ffaae82883a4829872aaed8c2f39f964

  • SHA512

    412ac4dd28a288454b49c586d92cef65f6462d085502e532c6d097d50d15f1ca6cad991bf7bf8c0d069cc81e757eb4d05c5c4428d0d33fa02f5741f51e80a15f

  • SSDEEP

    768:MkZPS0t4QzivE/snVIL64476w4p9q3UELMxX:MyPS0Xwi8ILl47D3LMp

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

Processes

  • /tmp/0aa4b24992c46a1512c04fef83835486ffaae82883a4829872aaed8c2f39f964.elf
    /tmp/0aa4b24992c46a1512c04fef83835486ffaae82883a4829872aaed8c2f39f964.elf
    1⤵
      PID:704

    Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads