Analysis

  • max time kernel
    0s
  • max time network
    32s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20240611-en
  • resource tags

    arch:armhfimage:debian9-armhf-20240611-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    06-11-2024 02:50

General

  • Target

    6e7a2db4f1afe2852f249cfe185b36485afc7e4995d498b3e1356ae9f3c505d0.elf

  • Size

    1KB

  • MD5

    fd1e92e7d2f95ee911f57ac5387ef16a

  • SHA1

    c03283fbbf5387412cf2da000c695b697476cf76

  • SHA256

    6e7a2db4f1afe2852f249cfe185b36485afc7e4995d498b3e1356ae9f3c505d0

  • SHA512

    30cf007d5812b75b7ed3e66635799404ddb174df581c3fbf6bfbbe6d28befc7116cf29219d9a5d711292b1c1b44239c647b2f7da52f4198f529e478f46edf084

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

SORA

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Mirai family

Processes

  • /tmp/6e7a2db4f1afe2852f249cfe185b36485afc7e4995d498b3e1356ae9f3c505d0.elf
    /tmp/6e7a2db4f1afe2852f249cfe185b36485afc7e4995d498b3e1356ae9f3c505d0.elf
    1⤵
      PID:645

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • /tmp/byte

      Filesize

      79KB

      MD5

      bef45203c68fc3734dd6fd1ad46f3c8b

      SHA1

      d00655f9e6da4ea13e26c7b985df909146b35b4d

      SHA256

      30d208417c8d64b0787de4a52e6f9c8c8433f4e8003089918705d73e1f8ee9ef

      SHA512

      b68c5accd6d080045bfdfd5f7bfb7d74735ae563514ab53aa2fa92c1cade08b69b79047d94e9b7b0728d174895079aaeea525650b526d7258ba99bf414846319