Analysis

  • max time kernel
    0s
  • max time network
    2s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20240418-en
  • resource tags

    arch:armhfimage:debian9-armhf-20240418-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    13-11-2024 13:18

General

  • Target

    dlr.arm5.elf

  • Size

    1KB

  • MD5

    0a7ca380c138f1dc59ba699c19725ca7

  • SHA1

    ec9257aaef5a793c507f1a41b3420d175f140de5

  • SHA256

    dadda6e0210001505df014c08d30b3ef57071eb9acc0c283fc341dd3e3108778

  • SHA512

    361ae78fa1ba82c7e71ae8b6680fa32b67433951bdad23139957878105754e3256d05173875e8520d3254013b0af115a70ffeab2e4fd16d2bde61c0d6459ac60

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Mirai family

Processes

  • /tmp/dlr.arm5.elf
    /tmp/dlr.arm5.elf
    1⤵
      PID:638

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • /tmp/byte

      Filesize

      108KB

      MD5

      02cac95c6cc1c629dbac8bc27c7d1ee9

      SHA1

      3118d56a9d27cdad78468ec1d296d82e5e7161dd

      SHA256

      23e0e50669e47ab61c17e46edfe6fe79b0917a1e840d49abdfc434207522fa7f

      SHA512

      397eaee2dbe29b85e580082b1ee41fd0bdb0a3b9307938ff3a50032a6713e538832a9b1522b8a5ce79af64161b8817ee8a970b22f440e1a0acd14770a13dd0b9