Analysis

  • max time kernel
    1s
  • max time network
    5s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20240611-en
  • resource tags

    arch:armhfimage:debian9-armhf-20240611-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    11-11-2024 02:03

General

  • Target

    07b11f501eacdce03c7a472d95bd587b7398a55dabf6ca9ac4eb025bbe76209e.elf

  • Size

    1KB

  • MD5

    6dbce42a627898a299cb1d283395e682

  • SHA1

    acb020d6969008e1cf846418e25ac87a2883d76d

  • SHA256

    07b11f501eacdce03c7a472d95bd587b7398a55dabf6ca9ac4eb025bbe76209e

  • SHA512

    514c2214d935e4fcabb3106f2b5b8ded4fe478e34bc23bfe9164c48a98b1b3bd0ec39d06aaa5eb894fa4cf9063ee01174842a44bb643860fa69bc487b12140d6

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Mirai family

Processes

  • /tmp/07b11f501eacdce03c7a472d95bd587b7398a55dabf6ca9ac4eb025bbe76209e.elf
    /tmp/07b11f501eacdce03c7a472d95bd587b7398a55dabf6ca9ac4eb025bbe76209e.elf
    1⤵
      PID:656

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • /tmp/byte

      Filesize

      111KB

      MD5

      6d97a559bb573a412ca643940d604978

      SHA1

      dc3973c7589b052711338b8fe04f790cfa247738

      SHA256

      d60130d48610638895e18f2994a264cd7fbb0560c7b2f552fc1715f4dfed30e5

      SHA512

      73bf35b97b292f3ffd9e40ac1057836cc1c97a16465eb2730098f4e8d6081c179c6ea5221c552064b462f2026b078fe1a78a013c8bb743b897f2990d9522cae0