Analysis

  • max time kernel
    0s
  • max time network
    41s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20240611-en
  • resource tags

    arch:armhfimage:debian9-armhf-20240611-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    26-11-2024 10:52

General

  • Target

    dlr.arm.elf

  • Size

    1KB

  • MD5

    14d5f732cb72e293f05ac1049d093fa5

  • SHA1

    33ae6bb7f9122c282bfcf5ecc07108beead9ac62

  • SHA256

    2a7a0b5e247a256cce945161bacf9b5327e359691045f0591635420c9e496be8

  • SHA512

    ee43321355b952e663ed008aa68a019845c79d623b49838aa575ed8638b3451f3e3cc3b1cd2b4d3ba348658a90713549f2673ec4beb90e61a68634c6da5252d9

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Mirai family

Processes

  • /tmp/dlr.arm.elf
    /tmp/dlr.arm.elf
    1⤵
      PID:652

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • /tmp/byte

      Filesize

      111KB

      MD5

      6d97a559bb573a412ca643940d604978

      SHA1

      dc3973c7589b052711338b8fe04f790cfa247738

      SHA256

      d60130d48610638895e18f2994a264cd7fbb0560c7b2f552fc1715f4dfed30e5

      SHA512

      73bf35b97b292f3ffd9e40ac1057836cc1c97a16465eb2730098f4e8d6081c179c6ea5221c552064b462f2026b078fe1a78a013c8bb743b897f2990d9522cae0