Analysis

  • max time kernel
    0s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20240611-en
  • resource tags

    arch:armhfimage:debian9-armhf-20240611-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    08-11-2024 03:02

General

  • Target

    7535be55796427859ab481e04adc3b0d048c4996f07694156cd2eb0ca4ccb092.elf

  • Size

    47KB

  • MD5

    0ec75f0aa09c3304cfeb73c4306eff78

  • SHA1

    bcda7f8716d7e55b0f015e01331fe9a944e2cb42

  • SHA256

    7535be55796427859ab481e04adc3b0d048c4996f07694156cd2eb0ca4ccb092

  • SHA512

    1b5b31d85283a71d01edeae9dc928fc75d53a947452f1c941157ae56a5b9ee82951c0c064b7578407ba1bc55b4900086dec74174ef68b3dd4b4c2cc532b210ba

  • SSDEEP

    768:aK7y1XGO1LCNgukEkvwtqPnH7u83nc0iFR9q3UELWt/iw+kvBGg6+fYtrBH1:E12O1LCNguovDPH7Tcr6LWhiw+kvBGgs

Malware Config

Extracted

Family

mirai

Botnet

SORA

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Mirai family
  • Reads runtime system information 1 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/7535be55796427859ab481e04adc3b0d048c4996f07694156cd2eb0ca4ccb092.elf
    /tmp/7535be55796427859ab481e04adc3b0d048c4996f07694156cd2eb0ca4ccb092.elf
    1⤵
    • Reads runtime system information
    PID:663

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads