Analysis

  • max time kernel
    0s
  • max time network
    148s
  • platform
    debian-12_armhf
  • resource
    debian12-armhf-20240221-en
  • resource tags

    arch:armhfimage:debian12-armhf-20240221-enkernel:6.1.0-17-armmp-lpaelocale:en-usos:debian-12-armhfsystem
  • submitted
    11-12-2024 15:07

General

  • Target

    boatnet.arm6.elf

  • Size

    26KB

  • MD5

    cd193ef61f00f224452b1807f9b88d75

  • SHA1

    e4db246b50258046a74c1c3201018ac50a35b088

  • SHA256

    d7b4f0b8be9099cd685c0ddf9d566864ff7e8a3465fc169a2405188a8b10e965

  • SHA512

    02d3a181e993d42da5d4c6fb712726766db14f041ef3d54bf72f7b9404b64c70415586f598e8b6197c40a4ee3d80487e424a10a97a2e11a6a976c527a3ae2862

  • SSDEEP

    768:JMKyhegCCMqfizjoNpd2vJdX6vwrlM29q3UELub:OKy4qfqoeJdXWgmLO

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Mirai family
  • Reads runtime system information 1 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/boatnet.arm6.elf
    /tmp/boatnet.arm6.elf
    1⤵
    • Reads runtime system information
    PID:706

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads