Analysis

  • max time kernel
    0s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20240729-en
  • resource tags

    arch:armhfimage:debian9-armhf-20240729-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    16-11-2024 07:40

General

  • Target

    5feeef561745ce33f17603056b632ea04eaf50adc9d9004e1a6e5bf7b1877f21.elf

  • Size

    19KB

  • MD5

    0865c26bc759d9feaf220a7288caf3df

  • SHA1

    ecd4eea7c66d57fa03b85c7b0b868e91c5264407

  • SHA256

    5feeef561745ce33f17603056b632ea04eaf50adc9d9004e1a6e5bf7b1877f21

  • SHA512

    a01fb4ba40f7ba4e01cfa2c9591f239568976d0c734495d54c56e2d9e70e77b6f3faa963dcf39b1dc9abbffce5b810461405ab15127dcdf2ff8ee5e9cc576ed1

  • SSDEEP

    384:N3me3Vg19bm2MxowbW6kn0HG0sdXIC62vnL6My1/SF5J9pvh7qmdGUEpiaMy5:t3Vg19bm2Wo9aHG0uFLhv9q3UEL/5

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Mirai family

Processes

  • /tmp/5feeef561745ce33f17603056b632ea04eaf50adc9d9004e1a6e5bf7b1877f21.elf
    /tmp/5feeef561745ce33f17603056b632ea04eaf50adc9d9004e1a6e5bf7b1877f21.elf
    1⤵
      PID:671

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/671-1-0x00008000-0x0001a6f0-memory.dmp