Analysis
-
max time kernel
2s -
max time network
30s -
platform
debian-9_armhf -
resource
debian9-armhf-20240611-en -
resource tags
arch:armhfimage:debian9-armhf-20240611-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem -
submitted
28-11-2024 02:58
Static task
static1
General
-
Target
7b70a361db32f477df25723fdda0dc1349235019cdb3738deaa1a5a80461bc64.elf
-
Size
48KB
-
MD5
5d58283e90264f69ff52fbcd52a3b178
-
SHA1
583d49cf615f7718873f27d58c6058c652a60c7d
-
SHA256
7b70a361db32f477df25723fdda0dc1349235019cdb3738deaa1a5a80461bc64
-
SHA512
9844662d31077cbc3f84903ff3c9cc527f99f63448251d6cf38d44bca8e4397d8d741be7dc69271591f22066a5d150e18ed7e16d2797606b449ba3a785423e11
-
SSDEEP
768:B0DdSs4rsssH9dhZ4zJivWvHmWrkiunSKwharbV0iKpWpt5UYaI:Bsdn4rs/rWeliunEarh0iaq5UYa
Malware Config
Extracted
mirai
LZRD
Signatures
-
Mirai family
-
Writes file to tmp directory 1 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/byte 7b70a361db32f477df25723fdda0dc1349235019cdb3738deaa1a5a80461bc64.elf
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
117KB
MD590dace050831597345679d7dfbd7d5b0
SHA16645cde5ce93d96a5e1e541770f14dc59100f364
SHA256509a1343fab6dc704c0cb805284df2c7bd17194c487d250dfb9d6291561f981a
SHA51271cae1e7c7ef3722d7fe325544898316c357fd81f063f867047586315b4170fe886302a672574e65fff937132f0afe233da0481b2da6fe36a14507e8c6212046