Analysis

  • max time kernel
    0s
  • max time network
    2s
  • platform
    debian-9_mips
  • resource
    debian9-mipsbe-20240418-en
  • resource tags

    arch:mipsimage:debian9-mipsbe-20240418-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipssystem
  • submitted
    11-11-2024 02:32

General

  • Target

    6b63e93361d06598e51c164f0e8feb8514e86f592f8b029afc45d3cb8e29d7a1.elf

  • Size

    1KB

  • MD5

    aec4add3b34f6d1582c50b1c958094d8

  • SHA1

    c872cb8ca468559b12de3a1485f790c22326aa84

  • SHA256

    6b63e93361d06598e51c164f0e8feb8514e86f592f8b029afc45d3cb8e29d7a1

  • SHA512

    a12fc73b6c3d7e9cbbe91a4835f31dfcc9835a442e66ab9c855f2b9362afc6abb778859389b2cc7056b6972f464ae31a8e0af12c25c0e93eddf0377027952d16

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Mirai family
  • Writes file to tmp directory 1 IoCs

    Malware often drops required files in the /tmp directory.

Processes

  • /tmp/6b63e93361d06598e51c164f0e8feb8514e86f592f8b029afc45d3cb8e29d7a1.elf
    /tmp/6b63e93361d06598e51c164f0e8feb8514e86f592f8b029afc45d3cb8e29d7a1.elf
    1⤵
    • Writes file to tmp directory
    PID:739

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • /tmp/byte

    Filesize

    137KB

    MD5

    442269900f28ef10d8b7a13f2bc5ed86

    SHA1

    2f997966590600fb4b5572f306a40bcbb6fe79eb

    SHA256

    a1badb5317009fe55702c638b0c5816a92337e855e83db12e99e721db7b193c3

    SHA512

    d861babc3d83bf705aa5efd5276e928d6335eabfe58c604968315f865ae1765fe9b099b21de8045b3acfc6b66b5c384ec39888dd72d69bc4105703cff9e19db1