Analysis

  • max time kernel
    0s
  • max time network
    152s
  • platform
    debian-12_armhf
  • resource
    debian12-armhf-20240221-en
  • resource tags

    arch:armhfimage:debian12-armhf-20240221-enkernel:6.1.0-17-armmp-lpaelocale:en-usos:debian-12-armhfsystem
  • submitted
    12-12-2024 23:56

General

  • Target

    b3astmode.arm7.elf

  • Size

    17KB

  • MD5

    00de6b649a7f17ad3d3587a9a749b0ba

  • SHA1

    1b39b3c7ba520bbae4e11558d288a876a4332df7

  • SHA256

    b120a5e137082eed5f271b7813dbe811ed6d8cdb4c0946c728966678970c145f

  • SHA512

    7f4772aca6149c298300e5b1afaa2e5ba3c2fbfe050bc86b90bb3e32fa78a1a8668f7a31344b308bab95f8f32bbc91b4622a46c4b6695c83df96e520ee087ea4

  • SSDEEP

    384:Xc0zmahlE935elWnNKMkjBmuhPRSJmdGU55YMowfaC:FKahgIsbkkgK3U03wfh

Malware Config

Extracted

Family

mirai

Botnet

UNST

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Mirai family
  • Reads runtime system information 1 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/b3astmode.arm7.elf
    /tmp/b3astmode.arm7.elf
    1⤵
    • Reads runtime system information
    PID:711

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads