Analysis

  • max time kernel
    0s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20240611-en
  • resource tags

    arch:armhfimage:debian9-armhf-20240611-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    19-09-2024 06:34

General

  • Target

    121f6189c7e852253db67ab3cbf600139e9a709f6b88d0477b99f873bce69495.elf

  • Size

    18KB

  • MD5

    e35c48d59ca6551fee45ca9993aa3ece

  • SHA1

    b5a2e9b9099d51f24e4a47cfb68289790e6245cb

  • SHA256

    121f6189c7e852253db67ab3cbf600139e9a709f6b88d0477b99f873bce69495

  • SHA512

    3051ac3446fbeb212350e3560e6bdbe6c5991fb824721d3f84433c352f3d4ab34e3c7fd7d552b226643c4023c80f55b4b23828da54c92309feeb9c65f6a1afe3

  • SSDEEP

    384:KglXgZ/LDT24ZXg23Mbb+41aMnu0Lyh7qmdGUEpiaLbq:KgVezdZ5cbb+4i/9q3UELL2

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

MIRAI

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

Processes

  • /tmp/121f6189c7e852253db67ab3cbf600139e9a709f6b88d0477b99f873bce69495.elf
    /tmp/121f6189c7e852253db67ab3cbf600139e9a709f6b88d0477b99f873bce69495.elf
    1⤵
      PID:644

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads