Analysis

  • max time kernel
    1s
  • max time network
    6s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20240611-en
  • resource tags

    arch:armhfimage:debian9-armhf-20240611-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    15-11-2024 02:46

General

  • Target

    8fdc1b9e469b6927ab76f1910d4d01f95154b13d5d3fb80de2f11a8a732f9d53.elf

  • Size

    1KB

  • MD5

    6de76f01611f77dc9269ad1e0729efe3

  • SHA1

    8fcb6954d8da0a4e7e9804397972762148721db6

  • SHA256

    8fdc1b9e469b6927ab76f1910d4d01f95154b13d5d3fb80de2f11a8a732f9d53

  • SHA512

    f7f276cffebb312ef6ceb630b92ff5785d3b67c71070e6b109a36431e62261b227eacee0af42037769f6d77aec2ff33359839fa8d30a4af4678c6291335a90ab

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Mirai family

Processes

  • /tmp/8fdc1b9e469b6927ab76f1910d4d01f95154b13d5d3fb80de2f11a8a732f9d53.elf
    /tmp/8fdc1b9e469b6927ab76f1910d4d01f95154b13d5d3fb80de2f11a8a732f9d53.elf
    1⤵
      PID:666

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • /tmp/byte

      Filesize

      108KB

      MD5

      02cac95c6cc1c629dbac8bc27c7d1ee9

      SHA1

      3118d56a9d27cdad78468ec1d296d82e5e7161dd

      SHA256

      23e0e50669e47ab61c17e46edfe6fe79b0917a1e840d49abdfc434207522fa7f

      SHA512

      397eaee2dbe29b85e580082b1ee41fd0bdb0a3b9307938ff3a50032a6713e538832a9b1522b8a5ce79af64161b8817ee8a970b22f440e1a0acd14770a13dd0b9