Analysis

  • max time kernel
    0s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20240611-en
  • resource tags

    arch:armhfimage:debian9-armhf-20240611-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    25-12-2024 15:42

General

  • Target

    boatnet.arm5.elf

  • Size

    18KB

  • MD5

    808f5f50b01bc61b6e3d21edaee5906b

  • SHA1

    5496cd0df2be38463ba94aec45a7d660e3afbb63

  • SHA256

    b12b8dcfdc3065807bc8e97c439e8b307152fe1d7fceeac2a1307f3c74085f9b

  • SHA512

    3922d9c77c0379c9e8a839ac2554b75053d2502983c25b72b092131437b9a84e7f6d237295f13b99da1ed16e7bd2fa104e6cd86d9187ca0df8ea99b02eaf69c1

  • SSDEEP

    384:MnfzRV0P6iOwrkom0DRnVATuSlShu6NvmPWtUn+KMaapYazRhymdGUop5h5lE:2dV0P6+kom0tVAoNvm+to1wxs3UoznlE

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Mirai family

Processes

  • /tmp/boatnet.arm5.elf
    /tmp/boatnet.arm5.elf
    1⤵
      PID:642

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads