Analysis

  • max time kernel
    0s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20240418-en
  • resource tags

    arch:armhfimage:debian9-armhf-20240418-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    23-12-2024 02:13

General

  • Target

    7de36acec0df6571a17ff54ff3154ffe3a12b0aa045e8bed81ef1b4d05066035.elf

  • Size

    20KB

  • MD5

    98d51abb6d8418a87437c0aa442f6704

  • SHA1

    4380d08def7a2976bab2cd17720be865be53dac9

  • SHA256

    7de36acec0df6571a17ff54ff3154ffe3a12b0aa045e8bed81ef1b4d05066035

  • SHA512

    3cbfdc2a1b08c6fadfe4e229cd65fd95cc1f00e7ab826d04d9cba506bd397bd19eec61fc6ce3d3fa9dcfe9cad6c4c8aa1638246d48488846e6e540ad0889fc38

  • SSDEEP

    384:v3CFDQy54M7zLnmZFiPThj6r8CKozfdchYC+Gyx2QSHWmuWqy5hymdGUop5htM:/CmyqM7zLnmZQLh+IWfdzFG/QPsqcs3a

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Mirai family

Processes

  • /tmp/7de36acec0df6571a17ff54ff3154ffe3a12b0aa045e8bed81ef1b4d05066035.elf
    /tmp/7de36acec0df6571a17ff54ff3154ffe3a12b0aa045e8bed81ef1b4d05066035.elf
    1⤵
      PID:647

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads