Analysis

  • max time kernel
    4s
  • max time network
    41s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20240611-en
  • resource tags

    arch:armhfimage:debian9-armhf-20240611-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    13-11-2024 13:32

General

  • Target

    dlr.arm.elf

  • Size

    1KB

  • MD5

    f33f1709a31d7caecf2ba553a23f7bc6

  • SHA1

    54fc202121de632af9b98db0e5698187ecbb748b

  • SHA256

    257b15151a6af1ef107b79ffc0f4f539bfd488a13c2683a4c8bdfcfcbc3a85cb

  • SHA512

    0c9fb6c5e193914fec6b4be3028057f6f60d1d9b4e338c546b17164d3d4d9905e259f1f2d7778c35155cca16a37a2a37a90b770c64ac9c7cf109422e88bc61d1

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Mirai family

Processes

  • /tmp/dlr.arm.elf
    /tmp/dlr.arm.elf
    1⤵
      PID:655

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • /tmp/byte

      Filesize

      111KB

      MD5

      6d97a559bb573a412ca643940d604978

      SHA1

      dc3973c7589b052711338b8fe04f790cfa247738

      SHA256

      d60130d48610638895e18f2994a264cd7fbb0560c7b2f552fc1715f4dfed30e5

      SHA512

      73bf35b97b292f3ffd9e40ac1057836cc1c97a16465eb2730098f4e8d6081c179c6ea5221c552064b462f2026b078fe1a78a013c8bb743b897f2990d9522cae0