Analysis

  • max time kernel
    0s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20240729-en
  • resource tags

    arch:armhfimage:debian9-armhf-20240729-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    09-11-2024 04:01

General

  • Target

    ef3138f7fea168cc5a4bd913676ac46b0c47dfe24377845a210318a96f6ac1a2.elf

  • Size

    39KB

  • MD5

    ef0855a140703c30c9c46a6e88b9b182

  • SHA1

    90f038f24cb54b62cdad95b2d29b0c2de5d4807d

  • SHA256

    ef3138f7fea168cc5a4bd913676ac46b0c47dfe24377845a210318a96f6ac1a2

  • SHA512

    98211fccc133fbcd8dc3ec72ece3e6f07eb0c5120743fc1ff8388cb0dbc9cf2e778e4f88ef54c5a2d4d8bdba54b7f983044eb184833f03f46565c78dfb949439

  • SSDEEP

    768:fWVVasPGxpBnekBYlk8i0fPkD+bk4nwx/RWUiQ5JTYedi9q3UELyV:fWXasPGxplekBgTP654QwGH5JLG

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Mirai family
  • Reads runtime system information 1 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/ef3138f7fea168cc5a4bd913676ac46b0c47dfe24377845a210318a96f6ac1a2.elf
    /tmp/ef3138f7fea168cc5a4bd913676ac46b0c47dfe24377845a210318a96f6ac1a2.elf
    1⤵
    • Reads runtime system information
    PID:639

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads