Analysis

  • max time kernel
    0s
  • max time network
    142s
  • platform
    debian-12_armhf
  • resource
    debian12-armhf-20240729-en
  • resource tags

    arch:armhfimage:debian12-armhf-20240729-enkernel:6.1.0-17-armmp-lpaelocale:en-usos:debian-12-armhfsystem
  • submitted
    14-10-2024 15:36

General

  • Target

    JK375_na.elf

  • Size

    26KB

  • MD5

    a5f54c6438dd467e7b0131eb058bcc95

  • SHA1

    a5949c0684fb1c9540e3659b4af2b353881d8ba1

  • SHA256

    a36f4ec8690d46c9a4c3b82bd3a32f35776934e2837b0e47fc4d9fdd4ba6e822

  • SHA512

    7eceb9dbabc5a7a3f92afac3cd8f309b87d7eaef525fcc6d399e17f7bee19b092a0667f2d18e07943d9cdf0ccf420d0b7aacc5ce6144c2e6f8dd3c8e294f6dc7

  • SSDEEP

    768:eMKyhegCCMqfizjoNpd2vJdX6vwrO9q3UELu/Q:NKy4qfqoeJdXWgzL9

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Reads runtime system information 1 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/JK375_na.elf
    /tmp/JK375_na.elf
    1⤵
    • Reads runtime system information
    PID:703

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads