Analysis

  • max time kernel
    0s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20240611-en
  • resource tags

    arch:armhfimage:debian9-armhf-20240611-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    08/12/2024, 02:02

General

  • Target

    boatnet.arm6.elf

  • Size

    26KB

  • MD5

    5621ca386f013ca49286ac413864884b

  • SHA1

    608a9eb325d118314eeaf5d37f284801e5e10708

  • SHA256

    6b6be1867a099f7a6f44148c4bf6322e5f95c1bfd8a1be45a1a053f73e349042

  • SHA512

    dc4193e59c4af307a7f6830d5433c1a2bd362d9c6d9cf7c2779b12e34e23ed71b81d07e065dd80e2f694f0143aa5d9a47f94f88b0a5064f45e7c0ce9ba4d7e67

  • SSDEEP

    768:FMYwZ+dFwAMXlWBPCdlnf1LKK1+KyqW700Y1HxhNN9q3UELuI:6bZ+Adlnf1LF1+KDWA0QxhyLl

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Mirai family
  • Reads runtime system information 1 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/boatnet.arm6.elf
    /tmp/boatnet.arm6.elf
    1⤵
    • Reads runtime system information
    PID:668

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads