Analysis

  • max time kernel
    0s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20240611-en
  • resource tags

    arch:armhfimage:debian9-armhf-20240611-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    07-10-2024 01:11

General

  • Target

    a301a4ae43baac4bd723d0c31d7058a9.elf

  • Size

    18KB

  • MD5

    a301a4ae43baac4bd723d0c31d7058a9

  • SHA1

    8b6e3200c033ba2855086d0d0dca9f2312635d60

  • SHA256

    5a011dd4e8267664739c5227e23c9c69bef9e2e9244f370f6b26aaa1bcd4d315

  • SHA512

    c23aafc70b0521dd4480c38be5d5b72e426da0b45c7ee30582839d5b761679b2d1b27bb4a8c35a2e194c171248f2e615f17b3673e5843379c27be3f4485e5f66

  • SSDEEP

    384:MnfzRV0P6iOwrkom0DRnVATuSlShu6NvmPWtUn+KMaOahymdGUop5h5lo:2dV0P6+kom0tVAoNvm+to1Oas3Uoznlo

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

Processes

  • /tmp/a301a4ae43baac4bd723d0c31d7058a9.elf
    /tmp/a301a4ae43baac4bd723d0c31d7058a9.elf
    1⤵
      PID:675

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/675-1-0x00008000-0x0001b6e4-memory.dmp