Analysis

  • max time kernel
    0s
  • max time network
    2s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20240729-en
  • resource tags

    arch:armhfimage:debian9-armhf-20240729-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    10-11-2024 09:07

General

  • Target

    dlr.arm5.elf

  • Size

    1KB

  • MD5

    a04443e7fec5c0ff36ae0af3208d2cc1

  • SHA1

    1802bf09c7685c64e436157cf2fe9fd6c24f7d12

  • SHA256

    39c2ff5be63a45a98a7d98641ad695bc4d3db6468a3bb09f2f64629969aeaba3

  • SHA512

    c76c47ae66ca454f9e4d896c1f32e158a9500ed35d7dc49124c6d1a7f61765582dd52e46bb4ca975f639bf09cae7751bad3eec8f3a7189529995cb543564a8ca

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Mirai family

Processes

  • /tmp/dlr.arm5.elf
    /tmp/dlr.arm5.elf
    1⤵
      PID:671

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • /tmp/byte

      Filesize

      108KB

      MD5

      02cac95c6cc1c629dbac8bc27c7d1ee9

      SHA1

      3118d56a9d27cdad78468ec1d296d82e5e7161dd

      SHA256

      23e0e50669e47ab61c17e46edfe6fe79b0917a1e840d49abdfc434207522fa7f

      SHA512

      397eaee2dbe29b85e580082b1ee41fd0bdb0a3b9307938ff3a50032a6713e538832a9b1522b8a5ce79af64161b8817ee8a970b22f440e1a0acd14770a13dd0b9