Analysis

  • max time kernel
    0s
  • max time network
    19s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20240611-en
  • resource tags

    arch:armhfimage:debian9-armhf-20240611-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    05-11-2024 18:38

General

  • Target

    dlr.arm6.elf

  • Size

    1KB

  • MD5

    13ed0712a09a9bdedcd304ea5b428267

  • SHA1

    175a176bcab8f7e26c3afc77ab90fbded569d61e

  • SHA256

    8026b33c3a27251c79ddd67bf021c37b5b4b1b87632317b9e76f38df35d650c5

  • SHA512

    5b413323975c7957bc67f287b5b459579ea0b7646318a34b6e27e768d746a8f3fe84b431804d66175db940219c76e08111865e362a8313c75679acef0fb6e57a

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

SORA

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Mirai family
  • Writes file to tmp directory 1 IoCs

    Malware often drops required files in the /tmp directory.

Processes

  • /tmp/dlr.arm6.elf
    /tmp/dlr.arm6.elf
    1⤵
    • Writes file to tmp directory
    PID:652

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • /tmp/byte

    Filesize

    86KB

    MD5

    a43e9fc94b44146457050c47e96a4818

    SHA1

    dd40abb18bda7ba3bb222515aa06d7e29525548f

    SHA256

    de137a2b6427df64a6227b2e4af5649e17f02ac4e5b873eea574a6044af8d18d

    SHA512

    c80bfa9d13e0eb3ae7a73890a474956cec8f01da5af99095109bc2c5c6d1c99e8e89993151a6b71575ebbf28de24fe3da830b2055e7b972bc0dcb501ef584970