Analysis

  • max time kernel
    0s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20240418-en
  • resource tags

    arch:armhfimage:debian9-armhf-20240418-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    12-11-2024 01:01

General

  • Target

    fa0afbe0442fc5e1b976b38d8b84d5e1cc90ad127eff79ffc953739ea6ab673f.elf

  • Size

    142KB

  • MD5

    1e231c06296f4ddf22919b425bf21c3f

  • SHA1

    9fd32152a4c74afb27efc66457de2912b4996825

  • SHA256

    fa0afbe0442fc5e1b976b38d8b84d5e1cc90ad127eff79ffc953739ea6ab673f

  • SHA512

    9d493a9d2e6302176a343a20f020092942f3e0491ba88259520ca5faf234dc719e586307955c16f54c92626e085e5579a4b1ea93ea6bf660b291df772e061314

  • SSDEEP

    3072:zH6RVRp1hI2F03W8cpxuDq813A9+IogeKVprqs51h/AzR4TMkAQA7HA:zH6zNhXF0G8auDZeeS5NA9oMkq7A

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

SORA

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Mirai family

Processes

  • /tmp/fa0afbe0442fc5e1b976b38d8b84d5e1cc90ad127eff79ffc953739ea6ab673f.elf
    /tmp/fa0afbe0442fc5e1b976b38d8b84d5e1cc90ad127eff79ffc953739ea6ab673f.elf
    1⤵
      PID:653

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/653-1-0x00008000-0x000983ac-memory.dmp