Analysis

  • max time kernel
    0s
  • max time network
    3s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20240418-en
  • resource tags

    arch:armhfimage:debian9-armhf-20240418-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    01-11-2024 14:07

General

  • Target

    dlr.arm.elf

  • Size

    1KB

  • MD5

    be7c90ac4bb096ba24326520ca92edb9

  • SHA1

    49c2f56cefc4ef4c64dcf2f729df877bbceef26d

  • SHA256

    5a9e878eedeaa18fe096470997614b3e49351d19a02de3a29748508ea256060a

  • SHA512

    a424f6adff466d90e775831f15047280cd4e43fe123be806118b0fe27e3f12122ebbda2f50f2aa3df3877d288e21cefcad19e69946138d23e3d7ca57a9e71290

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

SORA

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Mirai family

Processes

  • /tmp/dlr.arm.elf
    /tmp/dlr.arm.elf
    1⤵
      PID:640

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • /tmp/byte

      Filesize

      83KB

      MD5

      a59ec8a40225153c5e227ddb42c2026e

      SHA1

      51733d2e5fb47114c06659978ca28954136a7e30

      SHA256

      e8d88c892972d0f61f915bbc8581d83a14ef86c6495d8406dba94adaeee96f19

      SHA512

      934b340231e97c20c5569e675310f32390cd170cf23e13fa0c15fc26cec49e27f011e4d3ed8fb1bcef09f6a0aae416119fffb1d2bb2e04fabd366bfc9f10c641