Analysis

  • max time kernel
    0s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20240418-en
  • resource tags

    arch:armhfimage:debian9-armhf-20240418-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    16-12-2024 07:52

General

  • Target

    Space.arm6.elf

  • Size

    39KB

  • MD5

    1fb4fd195a7443705726f1fad81718d7

  • SHA1

    2ceba44298db391239989670c05e16dbf6b1db93

  • SHA256

    bf197c61a502bd6f90bba31013dafd4b955e0c35437eb5891305727a5d1cce19

  • SHA512

    ae6b93d98905103ee2420abc0d9fc6a969260c8577dc9607e55e072904d902014e9b7fd197e9aac5807fb213d679e2f7875fd0d5855aad326fea59c0c018938d

  • SSDEEP

    768:iGPjXBOTsh1ewTyMdi6myAysX+9LVfSFAL330uhoE2lQb9q3UEL9S:3LYCNlAHX+BVf5jk9nLo

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Mirai family
  • Reads runtime system information 1 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/Space.arm6.elf
    /tmp/Space.arm6.elf
    1⤵
    • Reads runtime system information
    PID:660

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads