Analysis

  • max time kernel
    0s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20240611-en
  • resource tags

    arch:armhfimage:debian9-armhf-20240611-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    25-12-2024 15:16

General

  • Target

    159.100.14.33-boatnet.arm5-2024-12-25T143120.elf

  • Size

    18KB

  • MD5

    66ecca72835358a8e8cb2e5af5f469c1

  • SHA1

    d850d8aa6b7ffd5450700f909e0e87ee4f8084c7

  • SHA256

    5611684ce59b7c0fc1df7f456d8205c90e25622223fbc39c56d9ec0a2443179e

  • SHA512

    fd804b3cc3bbab8469691164c14e3bfe3a8e98c91b4c74fee5057f7eb659617542768250c49170e6efb0aa744e714526907e9530c4f74e61f5345adbcc7ad8dd

  • SSDEEP

    384:MjWzRV0P6iOwrkom0DRnVATuSlShu6NvmPWtUn+KMaMgJUhymdGUop5h5lH:6GV0P6+kom0tVAoNvm+to1Mrs3UoznlH

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Mirai family

Processes

  • /tmp/159.100.14.33-boatnet.arm5-2024-12-25T143120.elf
    /tmp/159.100.14.33-boatnet.arm5-2024-12-25T143120.elf
    1⤵
      PID:650

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads