Analysis
-
max time kernel
0s -
max time network
141s -
platform
debian-12_armhf -
resource
debian12-armhf-20240418-en -
resource tags
arch:armhfimage:debian12-armhf-20240418-enkernel:6.1.0-17-armmp-lpaelocale:en-usos:debian-12-armhfsystem -
submitted
08-11-2024 03:12
General
-
Target
855f7a37decba7df65760a36dea86c32320e41ee691c3d9f089bbdd6dc99bf65.elf
-
Size
28KB
-
MD5
2402afc763d171be78b22ea46590341f
-
SHA1
25065b099f8a47186e348c0c6ba7f80f560a5a61
-
SHA256
855f7a37decba7df65760a36dea86c32320e41ee691c3d9f089bbdd6dc99bf65
-
SHA512
b2b22d0f922f57ba23788c97c5ba0b5b58698b0f6d882ea5286a85177d8398af1596a3fba1856e78f619e15d038e58060adb7861f2921ad112e0bbad63a840cd
-
SSDEEP
768:eusHfRavjynNKnjFcZIhQzhKMXgP9q3UEL7g:IRwynNIOQQ1KMw+L0
Malware Config
Extracted
Family
mirai
Botnet
SORA
Signatures
-
Mirai family
-
Processes:
855f7a37decba7df65760a36dea86c32320e41ee691c3d9f089bbdd6dc99bf65.elfdescription ioc process File opened for reading /proc/self/exe 855f7a37decba7df65760a36dea86c32320e41ee691c3d9f089bbdd6dc99bf65.elf