Analysis
-
max time kernel
1s -
max time network
3s -
platform
debian-9_mipsel -
resource
debian9-mipsel-20240729-en -
resource tags
arch:mipselimage:debian9-mipsel-20240729-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipselsystem -
submitted
11-11-2024 11:07
Static task
static1
General
-
Target
4fbc90f05256ea2894ae4f8736b5a8794fb522e1f3addf38493afd50e386e5f7.elf
-
Size
1KB
-
MD5
b70e4984bf76da017a3e8ba962c5d781
-
SHA1
6ec0ce7916b5c907e57bfabfe8327f3aa1518224
-
SHA256
4fbc90f05256ea2894ae4f8736b5a8794fb522e1f3addf38493afd50e386e5f7
-
SHA512
177ecd3791bb0f75a83fb909da263634e549eba3c7cb43c0f8562c11a6315ad72fa59a3d0471b710cc9da0e63a10ffc1d071642182a330fb634870292585b0ea
Malware Config
Extracted
Family
mirai
Botnet
LZRD
Signatures
-
Mirai family
-
Writes file to tmp directory 1 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/byte 4fbc90f05256ea2894ae4f8736b5a8794fb522e1f3addf38493afd50e386e5f7.elf
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
137KB
MD5973357b4367bf43c6f6cf45dac7c231b
SHA13040ad2b7b0943b5abb614780c1a43c7a3f3831c
SHA256e35a1943ed7c2e95bb119671722cb8ea3d51810fe73a7e6950a4c8f3b8bdad33
SHA51246dd2a46ab7cd95f2949b02f95d3706585457ceebad94e3a28fb4cfbc42f16cc31ef7e1f8cc2cf7e1a808a86eec2aae347be52526a96f0f17a1d566469f2cd94