Analysis

  • max time kernel
    0s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20240611-en
  • resource tags

    arch:armhfimage:debian9-armhf-20240611-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    31-10-2024 03:54

General

  • Target

    d2a6e2d97bf8488de2788515a852c79f677a6d2734a0f45ce29f44076fe1df39.elf

  • Size

    69KB

  • MD5

    dfd763aa10da61d0118a56047872e6ba

  • SHA1

    550d0c4bc572e643db24202382aca5c47bb9daad

  • SHA256

    d2a6e2d97bf8488de2788515a852c79f677a6d2734a0f45ce29f44076fe1df39

  • SHA512

    70649ff09e5072d48132dec80e0146d9b727b181bbfc6866c11ea50a06478a3b8f33d8aced6f68443eee4c8fbd371ea51ed7383a45788ec01a373d8d567f023e

  • SSDEEP

    1536:LhZTRDjZhI3Cr5rfJ7mwHpmTlHhp8tq6qAK:Lt5m3Cr5fJ74383K

Malware Config

Extracted

Family

mirai

Botnet

UNSTABLE

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Mirai family
  • Deletes itself 1 IoCs
  • Reads runtime system information 1 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/d2a6e2d97bf8488de2788515a852c79f677a6d2734a0f45ce29f44076fe1df39.elf
    /tmp/d2a6e2d97bf8488de2788515a852c79f677a6d2734a0f45ce29f44076fe1df39.elf
    1⤵
    • Deletes itself
    • Reads runtime system information
    PID:655

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/655-1-0x00008000-0x00037904-memory.dmp