Analysis

  • max time kernel
    0s
  • max time network
    158s
  • platform
    debian-12_armhf
  • resource
    debian12-armhf-20240221-en
  • resource tags

    arch:armhfimage:debian12-armhf-20240221-enkernel:6.1.0-17-armmp-lpaelocale:en-usos:debian-12-armhfsystem
  • submitted
    17-12-2024 01:44

General

  • Target

    14d9a95db96bc847c2358f0992123bc928cdd50d34e16a2b3a3701824d9aa8f0.elf

  • Size

    26KB

  • MD5

    c2ae0355dfbb41f5709e12313c87c562

  • SHA1

    34541f53c0fa2b7e9fb0db1ba64af856050234ee

  • SHA256

    14d9a95db96bc847c2358f0992123bc928cdd50d34e16a2b3a3701824d9aa8f0

  • SHA512

    20b4d2d78bb50784e924a589cff00821298b0b4837c26f14b89f35b6223f246a67a832de539be448f05bcff826bec83e9eb7b63c3cd3742e51fc9ad9460a7671

  • SSDEEP

    768:eMKyhegCCMqxbuZwu439/4FlG4wXG9q3UELup:NKy4qBu4N/4FlGl7LY

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Mirai family
  • Reads runtime system information 1 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/14d9a95db96bc847c2358f0992123bc928cdd50d34e16a2b3a3701824d9aa8f0.elf
    /tmp/14d9a95db96bc847c2358f0992123bc928cdd50d34e16a2b3a3701824d9aa8f0.elf
    1⤵
    • Reads runtime system information
    PID:713

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads