Analysis
-
max time kernel
0s -
max time network
146s -
platform
debian-12_armhf -
resource
debian12-armhf-20240729-en -
resource tags
arch:armhfimage:debian12-armhf-20240729-enkernel:6.1.0-17-armmp-lpaelocale:en-usos:debian-12-armhfsystem -
submitted
22-11-2024 02:52
Static task
static1
General
-
Target
9d7d4a5c7a45e1a4cc0374019be3884c6b2e16087920bfd10a801c81d5b215c2.elf
-
Size
1KB
-
MD5
fe1123d6eee75bdebf8dba13bdc0ae3a
-
SHA1
bf7dc0196f04b8a4c8fc48af25ef487754ebd1a9
-
SHA256
9d7d4a5c7a45e1a4cc0374019be3884c6b2e16087920bfd10a801c81d5b215c2
-
SHA512
c8e6f3b951b7e94f51c68dbeb7b9486cd09905302ff6844910fa1fee31acba948cad17d6e9c71cce11a4588f170248dc8da70b617a797a48b05ed928b82e2909
Malware Config
Extracted
Family
mirai
Botnet
LZRD
Signatures
-
Mirai family
-
Writes file to tmp directory 1 IoCs
Malware often drops required files in the /tmp directory.
Processes:
9d7d4a5c7a45e1a4cc0374019be3884c6b2e16087920bfd10a801c81d5b215c2.elfdescription ioc process File opened for modification /tmp/byte 9d7d4a5c7a45e1a4cc0374019be3884c6b2e16087920bfd10a801c81d5b215c2.elf
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
117KB
MD590dace050831597345679d7dfbd7d5b0
SHA16645cde5ce93d96a5e1e541770f14dc59100f364
SHA256509a1343fab6dc704c0cb805284df2c7bd17194c487d250dfb9d6291561f981a
SHA51271cae1e7c7ef3722d7fe325544898316c357fd81f063f867047586315b4170fe886302a672574e65fff937132f0afe233da0481b2da6fe36a14507e8c6212046