Analysis

  • max time kernel
    0s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20240611-en
  • resource tags

    arch:armhfimage:debian9-armhf-20240611-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    26-12-2024 04:07

General

  • Target

    xd.arm5.elf

  • Size

    25KB

  • MD5

    f045c51cd05035f4b7f8ba72a061bb0d

  • SHA1

    7fd3f73455e32d92a283a60793c4cff93044b708

  • SHA256

    3df735a6d46483ccb2cb3c1b8e0630baa3221dd038da1047267d08c6f7d00b37

  • SHA512

    1a46139ddccc3b7593be595637b52035f0f12126d545badf919be84a78d3d2e738779720ea4489d1209c7f1e971bf2bd3b621347a06091b5df44e14b7c03fdde

  • SSDEEP

    768:xRSa8ZS/L6rze3OXrFKg9KZrqoDudGIs3UozYB:vSjFJXZBCJDudGza

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Mirai family

Processes

  • /tmp/xd.arm5.elf
    /tmp/xd.arm5.elf
    1⤵
      PID:661

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads