Analysis

  • max time kernel
    0s
  • max time network
    140s
  • platform
    debian-12_armhf
  • resource
    debian12-armhf-20240729-en
  • resource tags

    arch:armhfimage:debian12-armhf-20240729-enkernel:6.1.0-17-armmp-lpaelocale:en-usos:debian-12-armhfsystem
  • submitted
    15-12-2024 03:44

General

  • Target

    6bc8f9ac5ac870289e3e1543410af764d6c2c3aa2ef353f6cc93a19c7d40250f.elf

  • Size

    26KB

  • MD5

    81939f16d81a46ffb60a701b936a563f

  • SHA1

    e6d6dcea92a8b66b963f90907dc2a1772e8ba18a

  • SHA256

    6bc8f9ac5ac870289e3e1543410af764d6c2c3aa2ef353f6cc93a19c7d40250f

  • SHA512

    f359230d4cb23de304dca2cacccf17bff7a83ccecf10aa0b200e16d79434722078a3ac9327b045e590fbf233701ae84a07a6d56c6b34b814522ea8dfba53bfaf

  • SSDEEP

    768:JMKyhegCCMqfizjoNpd2vJdX6vwrVSqs9q3UELuU:OKy4qfqoeJdXWgwq1LJ

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Mirai family
  • Reads runtime system information 1 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/6bc8f9ac5ac870289e3e1543410af764d6c2c3aa2ef353f6cc93a19c7d40250f.elf
    /tmp/6bc8f9ac5ac870289e3e1543410af764d6c2c3aa2ef353f6cc93a19c7d40250f.elf
    1⤵
    • Reads runtime system information
    PID:703

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads