Analysis

  • max time kernel
    0s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20240729-en
  • resource tags

    arch:armhfimage:debian9-armhf-20240729-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    27-12-2024 01:25

General

  • Target

    db0fa4b8db0333367e9bda3ab68b8042.arm6.elf

  • Size

    38KB

  • MD5

    633feced4322e4fa23c1951b9074e3c7

  • SHA1

    c2e7745d6c247bf8d783e8ed2ecf139eeba905e3

  • SHA256

    d0b980e1970d695914dcc4e16d0a8f6a92503bb76f59111c0e3c8d656e4bc84a

  • SHA512

    9e4125717d7bc4c8f2720f7a1f8624d2b29420d6ab06398a5c48e008a1e07c2eaf7d784f2e4ef1ce2bc8684e0ab5fc3db0785256d6495653ed80043dc16fb8fe

  • SSDEEP

    768:bzz4tgJ3oAOS4u2T1/RuoYrcs1kkCzyGMzRSXzsFIW+ZHFnGvxdSyELU97Amq3UC:bpou6/KxRC+GgwXeIGRELu7AJN

Malware Config

Extracted

Family

mirai

Botnet

UNSTABLE

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Mirai family
  • Reads runtime system information 1 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/db0fa4b8db0333367e9bda3ab68b8042.arm6.elf
    /tmp/db0fa4b8db0333367e9bda3ab68b8042.arm6.elf
    1⤵
    • Reads runtime system information
    PID:643

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads