Analysis
-
max time kernel
0s -
max time network
2s -
platform
debian-9_mips -
resource
debian9-mipsbe-20240418-en -
resource tags
arch:mipsimage:debian9-mipsbe-20240418-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipssystem -
submitted
11-11-2024 02:32
Static task
static1
General
-
Target
6b63e93361d06598e51c164f0e8feb8514e86f592f8b029afc45d3cb8e29d7a1.elf
-
Size
1KB
-
MD5
aec4add3b34f6d1582c50b1c958094d8
-
SHA1
c872cb8ca468559b12de3a1485f790c22326aa84
-
SHA256
6b63e93361d06598e51c164f0e8feb8514e86f592f8b029afc45d3cb8e29d7a1
-
SHA512
a12fc73b6c3d7e9cbbe91a4835f31dfcc9835a442e66ab9c855f2b9362afc6abb778859389b2cc7056b6972f464ae31a8e0af12c25c0e93eddf0377027952d16
Malware Config
Extracted
Family
mirai
Botnet
LZRD
Signatures
-
Mirai family
-
Writes file to tmp directory 1 IoCs
Malware often drops required files in the /tmp directory.
Processes:
6b63e93361d06598e51c164f0e8feb8514e86f592f8b029afc45d3cb8e29d7a1.elfdescription ioc Process File opened for modification /tmp/byte 6b63e93361d06598e51c164f0e8feb8514e86f592f8b029afc45d3cb8e29d7a1.elf
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
137KB
MD5442269900f28ef10d8b7a13f2bc5ed86
SHA12f997966590600fb4b5572f306a40bcbb6fe79eb
SHA256a1badb5317009fe55702c638b0c5816a92337e855e83db12e99e721db7b193c3
SHA512d861babc3d83bf705aa5efd5276e928d6335eabfe58c604968315f865ae1765fe9b099b21de8045b3acfc6b66b5c384ec39888dd72d69bc4105703cff9e19db1