Analysis

  • max time kernel
    0s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20240729-en
  • resource tags

    arch:armhfimage:debian9-armhf-20240729-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    09-11-2024 03:13

General

  • Target

    95c60946fa5324ecd2225107a1baf9d0be6d678f6bae0f3d869dc7714980f73d.elf

  • Size

    17KB

  • MD5

    a61208a38a38890889bddb6cfddc2bb5

  • SHA1

    6bc309457bcac8a5af7548a260e7d702bf01d7ad

  • SHA256

    95c60946fa5324ecd2225107a1baf9d0be6d678f6bae0f3d869dc7714980f73d

  • SHA512

    eff51c4c40091fe3c8642f1dd1e71f74ceccc84c0d77edffe82f8952a6a447343a5facd521c3737f492967def33d353af57daba07d7656e5ef66ff531c35d14b

  • SSDEEP

    384:qALoRBrZGswHUuHxqooKbCIsLLiKWXh7qmdGUEpia6:JKSjRqcbCnyKWX9q3UEL6

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Mirai family

Processes

  • /tmp/95c60946fa5324ecd2225107a1baf9d0be6d678f6bae0f3d869dc7714980f73d.elf
    /tmp/95c60946fa5324ecd2225107a1baf9d0be6d678f6bae0f3d869dc7714980f73d.elf
    1⤵
      PID:646

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/646-1-0x00008000-0x0001aad8-memory.dmp