Analysis

  • max time kernel
    0s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20240611-en
  • resource tags

    arch:armhfimage:debian9-armhf-20240611-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    26-12-2024 22:02

General

  • Target

    boatnet.arm6.elf

  • Size

    34KB

  • MD5

    4af780876c0b855a3876beffafa8ba1a

  • SHA1

    5ef079199e51fef913a71d5be763f97d55994e64

  • SHA256

    230081bc9ac51f89a62ddf71fd5a54fc0ecbf5b387252a16c6215a1cdb1d5c46

  • SHA512

    ab9661c436d5729c73d65ae831a2d603be6a1412ca1d5d345154860a490ddc536afbe72735b4503a9a95798705b877da521f776271b9b65d33099f884d359019

  • SSDEEP

    768:heZofzQ3oyhqg7weQUx3cYSHyfx7NKLdCLz5QCHNVr9q3UELc1:AsMJ4g7weQQ3cYmywC/5nHNVKLW

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Mirai family
  • Reads runtime system information 1 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/boatnet.arm6.elf
    /tmp/boatnet.arm6.elf
    1⤵
    • Reads runtime system information
    PID:663

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads