Analysis

  • max time kernel
    0s
  • max time network
    2s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20240729-en
  • resource tags

    arch:armhfimage:debian9-armhf-20240729-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    06-11-2024 03:02

General

  • Target

    7f015fd87ac05eef175b389b19d6fbb4d8294fa7a4e5b1646fad7bc71fb7850b.elf

  • Size

    1KB

  • MD5

    728be9b5c91b63e7cd1f6ebd96879ff8

  • SHA1

    35681f2c84d12ea1896b218d739e61da12932b40

  • SHA256

    7f015fd87ac05eef175b389b19d6fbb4d8294fa7a4e5b1646fad7bc71fb7850b

  • SHA512

    13a8516322928ac1af415880dd36bb7a40232bc12bf9d5bbeb96bb6cec84eb1f11d9daa5f992b3f0be07e55a9bce73ae860b053aac5c96802aae09dc3241ed68

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

SORA

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Mirai family
  • Writes file to tmp directory 1 IoCs

    Malware often drops required files in the /tmp directory.

Processes

  • /tmp/7f015fd87ac05eef175b389b19d6fbb4d8294fa7a4e5b1646fad7bc71fb7850b.elf
    /tmp/7f015fd87ac05eef175b389b19d6fbb4d8294fa7a4e5b1646fad7bc71fb7850b.elf
    1⤵
    • Writes file to tmp directory
    PID:645

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • /tmp/byte

    Filesize

    158KB

    MD5

    4eb42b9c0324c52aa1abeca8ea1f79a8

    SHA1

    00ec248b8264e7816f878ed08eade699e17d7f23

    SHA256

    5b7be271c2a864158115154710147cc12077e4d87f8a0701534e27ad32b2abde

    SHA512

    efeef18bb311d6c5b9dc656de611deb09ab61c5ac4b2ea79a2a77d0aa14daca9a83c5502f1bceb529a2f362573086eb9d81ce9f526708419ff5fd40eaf647086