Analysis

  • max time kernel
    0s
  • max time network
    194s
  • platform
    debian-12_armhf
  • resource
    debian12-armhf-20240221-en
  • resource tags

    arch:armhfimage:debian12-armhf-20240221-enkernel:6.1.0-17-armmp-lpaelocale:en-usos:debian-12-armhfsystem
  • submitted
    31-10-2024 04:11

General

  • Target

    efc4c0e74615df09dfa10a8a89b19e471e3a057f455996d5009021dff8cd7af5.elf

  • Size

    47KB

  • MD5

    1cd350c67ef83ea19e30ee9a203631de

  • SHA1

    2aa1a372c4c175806ffec0fc0a7743d443da1d10

  • SHA256

    efc4c0e74615df09dfa10a8a89b19e471e3a057f455996d5009021dff8cd7af5

  • SHA512

    7e995c49d2d139aa279fc66ed80377c49cf02c1a5d33df7908e45da2b9806dd8e11749a7a30a144039f5bc35cf36ad294f4e104cb07a19226fdc2bc1315f14bb

  • SSDEEP

    768:nRl7zzlRRSJLu8TKxkFj6pMWHLfe2zY121ZHLmMW/ogGj1nINPHpFfUJ9SUGjBXn:RFzJRRSxTMkZkLG2zlZ+3MngFfUpGjBX

Malware Config

Extracted

Family

mirai

Botnet

UNSTABLE

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Mirai family
  • Reads runtime system information 1 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/efc4c0e74615df09dfa10a8a89b19e471e3a057f455996d5009021dff8cd7af5.elf
    /tmp/efc4c0e74615df09dfa10a8a89b19e471e3a057f455996d5009021dff8cd7af5.elf
    1⤵
    • Reads runtime system information
    PID:711

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads