Analysis

  • max time kernel
    0s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20240611-en
  • resource tags

    arch:armhfimage:debian9-armhf-20240611-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    04-11-2024 02:18

General

  • Target

    4466fed9225ceff96ae803f596e69bb8a9059a755beaebe23bdafa40b923a39d.elf

  • Size

    23KB

  • MD5

    7a4928e7dd04c753a9ba2cc3b9008edb

  • SHA1

    b3493a7bf5019320e3fb0c4186c0ded37c7ca840

  • SHA256

    4466fed9225ceff96ae803f596e69bb8a9059a755beaebe23bdafa40b923a39d

  • SHA512

    c10f4b35f5175b73ae6aea3565ba9c47dc66832ded9fda31147bbce9b1d316833fc58d9b8aa54b95c5a5603b8769b2aa65fdfd4daf91f1c8b66b9bff7155ccce

  • SSDEEP

    384:4CQKXlhqaEBb8CuYTv6UwKOM9IKPhorxtTyaM6XnuzxfWNNu4Y6dSfOJNthymdGZ:4CQKirBb84TlOM9IdxoaM6Xns9WN5pSR

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

SORA

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Mirai family

Processes

  • /tmp/4466fed9225ceff96ae803f596e69bb8a9059a755beaebe23bdafa40b923a39d.elf
    /tmp/4466fed9225ceff96ae803f596e69bb8a9059a755beaebe23bdafa40b923a39d.elf
    1⤵
      PID:646

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/646-1-0x00008000-0x0001e9e8-memory.dmp