Analysis
-
max time kernel
0s -
platform
debian-9_armhf -
resource
debian9-armhf-20240611-en -
resource tags
arch:armhfimage:debian9-armhf-20240611-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem -
submitted
28-12-2024 02:11
General
-
Target
45.200.149.186-boatnet.arm6-2024-12-28T012300.elf
-
Size
26KB
-
MD5
f827d150c7e116ce862756538d49aa62
-
SHA1
b12e233f2ff5d4f33d630851f527094e8d4dff79
-
SHA256
93509415dffd07170dcbf44adabd06a2c270df319b79426143aa423070392cd0
-
SHA512
8f89f51bded1f76cc6121cbdf5950a18abd6cd15f3ad4a82ea6c46f6417bbc2d887f200b1b115b1d7f92ff6f2a777d0221beb200147ae0357b07fa32bab67c41
-
SSDEEP
768:JMKyhegCCMqfizjoNpd2vJdX6vwrs9q3UELuge:OKy4qfqoeJdXWg1LZe
Malware Config
Extracted
Family
mirai
Botnet
LZRD
Signatures
-
Mirai family
-
description ioc Process File opened for reading /proc/self/exe 45.200.149.186-boatnet.arm6-2024-12-28T012300.elf