Analysis

  • max time kernel
    0s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20240611-en
  • resource tags

    arch:armhfimage:debian9-armhf-20240611-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    28-12-2024 02:11

General

  • Target

    45.200.149.186-boatnet.arm6-2024-12-28T012300.elf

  • Size

    26KB

  • MD5

    f827d150c7e116ce862756538d49aa62

  • SHA1

    b12e233f2ff5d4f33d630851f527094e8d4dff79

  • SHA256

    93509415dffd07170dcbf44adabd06a2c270df319b79426143aa423070392cd0

  • SHA512

    8f89f51bded1f76cc6121cbdf5950a18abd6cd15f3ad4a82ea6c46f6417bbc2d887f200b1b115b1d7f92ff6f2a777d0221beb200147ae0357b07fa32bab67c41

  • SSDEEP

    768:JMKyhegCCMqfizjoNpd2vJdX6vwrs9q3UELuge:OKy4qfqoeJdXWg1LZe

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Mirai family
  • Reads runtime system information 1 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/45.200.149.186-boatnet.arm6-2024-12-28T012300.elf
    /tmp/45.200.149.186-boatnet.arm6-2024-12-28T012300.elf
    1⤵
    • Reads runtime system information
    PID:638

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads