Analysis

  • max time kernel
    0s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20240611-en
  • resource tags

    arch:armhfimage:debian9-armhf-20240611-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    21-12-2024 02:21

General

  • Target

    314233f9704b984e45a022effb0dda9190b3e9b551fff5428c70c8272094d592.elf

  • Size

    17KB

  • MD5

    4f8615f1dcb3405c37712e19b5c311d4

  • SHA1

    5725e46ffc1e34b3c14ef3ceb8345202e296588b

  • SHA256

    314233f9704b984e45a022effb0dda9190b3e9b551fff5428c70c8272094d592

  • SHA512

    f0b78f406203014fa2036d6e274cd5e64c93c9aee99ae2fac2509b7a152d4b17a568c2897a59292b0f8c193f5d806f3a91466718261db3501f7138136bed80ea

  • SSDEEP

    384:TALoRBrZGswHUuHxqooKbCIsLLiKWwbxh7qmdGUEpiaL:UKSjRqcbCnyKWwbx9q3UELL

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Mirai family

Processes

  • /tmp/314233f9704b984e45a022effb0dda9190b3e9b551fff5428c70c8272094d592.elf
    /tmp/314233f9704b984e45a022effb0dda9190b3e9b551fff5428c70c8272094d592.elf
    1⤵
      PID:663

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads