Analysis

  • max time kernel
    0s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20240611-en
  • resource tags

    arch:armhfimage:debian9-armhf-20240611-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    01/12/2024, 09:05

General

  • Target

    boatnet.arm5.elf

  • Size

    18KB

  • MD5

    f5f92638ade22d6b2ab3ddedd74bb85a

  • SHA1

    fcb1e5971ba86eb9a6b75dcc9e4d9d6b4f76d059

  • SHA256

    8239ecbad8cc24bf15d2b19c2188e5b92bf7a90578f678beae2a74817405f914

  • SHA512

    8ff42e685db9ede31e27f82ab348109b41e04a10c656f5f4d2db3486baf77b61e0667c777c65998fe197c769bbf190e73d0b2c668764c388a8a6a400f05856bd

  • SSDEEP

    384:yyHdDxi5VVG8HuvbAO/TVgsi2cXHmhymdGUop5hXwn:pQzVbRSKsjkGs3UozJwn

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Mirai family

Processes

  • /tmp/boatnet.arm5.elf
    /tmp/boatnet.arm5.elf
    1⤵
      PID:665

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads