Analysis

  • max time kernel
    0s
  • max time network
    142s
  • platform
    debian-12_armhf
  • resource
    debian12-armhf-20240418-en
  • resource tags

    arch:armhfimage:debian12-armhf-20240418-enkernel:6.1.0-17-armmp-lpaelocale:en-usos:debian-12-armhfsystem
  • submitted
    13-11-2024 23:47

General

  • Target

    botnet.arm6.elf

  • Size

    40KB

  • MD5

    2b4ad5830354003ac3fd090b81353c23

  • SHA1

    57d0ce6e5af203b88e9dbbc666aa53e4ffeff3f3

  • SHA256

    f9272c16f06f765a3b0c0489f7c56b00b41e714069cd0f9a1479027603da3aa0

  • SHA512

    50d4d9579d0ab10207d4301de23136cf5adbc0f0c3fbe04238aed634c6b2ab5771889ca48efc009419f0cb2129552cdddd5df1734be0521a91f3ff43cf44da7d

  • SSDEEP

    768:6lpD0ZbrRGLcM9XFhFfmp0XpAnKlny2yzF4dF8stcZ2sHNgmbq3UIKn:iRqGAShFmpaiaI+n7cZ2siw

Malware Config

Extracted

Family

mirai

Botnet

MIRAI

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Mirai family
  • Reads runtime system information 1 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/botnet.arm6.elf
    /tmp/botnet.arm6.elf
    1⤵
    • Reads runtime system information
    PID:702

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/702-1-0x00008000-0x00030e7c-memory.dmp