Analysis

  • max time kernel
    0s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20240418-en
  • resource tags

    arch:armhfimage:debian9-armhf-20240418-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    28-12-2024 02:50

General

  • Target

    d0319e7fc5d392f220f2f96717b43c65343010e15233cbb80e1116cb6ea5abba.elf

  • Size

    19KB

  • MD5

    4667a657f27a938bc590b7526404a378

  • SHA1

    a69cbbe9737dd8550816a52206ed80a765dfeb3b

  • SHA256

    d0319e7fc5d392f220f2f96717b43c65343010e15233cbb80e1116cb6ea5abba

  • SHA512

    a30b98d9004cd8eec917df6f3b4c0b00f0ffbf8d87edca6ff8dc049bc8e264dbb4ab39b97d7fc04128e19e2081e329b098383bc0924058931f81efcf27e155da

  • SSDEEP

    384:G3me3Vg19bm2MxowbW6kn0HG0sdXIC62vnL6MyC9fHVtFth7qmdGUEpiaMy8:43Vg19bm2Wo9aHG0uFLVfHVJ9q3UEL/8

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Mirai family

Processes

  • /tmp/d0319e7fc5d392f220f2f96717b43c65343010e15233cbb80e1116cb6ea5abba.elf
    /tmp/d0319e7fc5d392f220f2f96717b43c65343010e15233cbb80e1116cb6ea5abba.elf
    1⤵
      PID:642

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads