Analysis

  • max time kernel
    0s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20240611-en
  • resource tags

    arch:armhfimage:debian9-armhf-20240611-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    02/12/2024, 02:04

General

  • Target

    189fbc9058c3b098bf8e38c81b08b317eef943df1184bcb5252ff6190677885a.elf

  • Size

    18KB

  • MD5

    5e16ce6073a083d6c3258c9cb80232c8

  • SHA1

    e9c1f45450b938bb810ec2f60a892c27cb42a45b

  • SHA256

    189fbc9058c3b098bf8e38c81b08b317eef943df1184bcb5252ff6190677885a

  • SHA512

    06adb1d6b5b7405b85e62a1a9ecef9ce40730a44808dde411da7267249c33ec71a22b410e536c7d98bc7eb46953df45b3fe6dfd242517e343c677d5f7bf6bdb7

  • SSDEEP

    384:MjWzRV0P6iOwrkom0DRnVATuSlShu6NvmPWtUn+KMaB6hymdGUop5h5l9M:6GV0P6+kom0tVAoNvm+to1ws3Uoznl2

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Mirai family

Processes

  • /tmp/189fbc9058c3b098bf8e38c81b08b317eef943df1184bcb5252ff6190677885a.elf
    /tmp/189fbc9058c3b098bf8e38c81b08b317eef943df1184bcb5252ff6190677885a.elf
    1⤵
      PID:641

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads