Analysis
-
max time kernel
4s -
max time network
7s -
platform
debian-9_armhf -
resource
debian9-armhf-20240418-en -
resource tags
arch:armhfimage:debian9-armhf-20240418-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem -
submitted
15-11-2024 03:00
Static task
static1
General
-
Target
c87c43ffbe1736452c78e856544d12e2c0a32872b733ad8bd7ffeee98c1e19a7.elf
-
Size
1KB
-
MD5
50bfcd5178255355bf1c2e70e06d6f22
-
SHA1
5892057c4fd9af5506983f0428aeaf6490df4d39
-
SHA256
c87c43ffbe1736452c78e856544d12e2c0a32872b733ad8bd7ffeee98c1e19a7
-
SHA512
8c4edcd503ca39a66d5c6acfe64b2f0bb10af149478d1098faca7de9048007ad4d70e4dc8f30d664f984c343efa2c1f688751c2fe6958812f183124f96beed13
Malware Config
Extracted
Family
mirai
Botnet
LZRD
Signatures
-
Mirai family
-
Writes file to tmp directory 1 IoCs
Malware often drops required files in the /tmp directory.
Processes:
c87c43ffbe1736452c78e856544d12e2c0a32872b733ad8bd7ffeee98c1e19a7.elfdescription ioc Process File opened for modification /tmp/byte c87c43ffbe1736452c78e856544d12e2c0a32872b733ad8bd7ffeee98c1e19a7.elf
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
117KB
MD590dace050831597345679d7dfbd7d5b0
SHA16645cde5ce93d96a5e1e541770f14dc59100f364
SHA256509a1343fab6dc704c0cb805284df2c7bd17194c487d250dfb9d6291561f981a
SHA51271cae1e7c7ef3722d7fe325544898316c357fd81f063f867047586315b4170fe886302a672574e65fff937132f0afe233da0481b2da6fe36a14507e8c6212046