Analysis

  • max time kernel
    0s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20240418-en
  • resource tags

    arch:armhfimage:debian9-armhf-20240418-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    31-12-2024 02:35

General

  • Target

    754c52a5236f701b2b83914f478c1bace8f1735a00f7702b3b70f80059b9be62.elf

  • Size

    18KB

  • MD5

    5680b553d7990383ac30728dc210c7e9

  • SHA1

    2e17845d26e6d90797cd711ba6cdfcdffe513447

  • SHA256

    754c52a5236f701b2b83914f478c1bace8f1735a00f7702b3b70f80059b9be62

  • SHA512

    021727ba20093eb570de0d41f4720d4049f880914d4d20b3628c97d89e0ec7311814fc8293bf5390dfab9f280a4775cfe5157c2dc2c1b0169cdfe110dcea0505

  • SSDEEP

    384:JdSP0EnPELJBIOv4WRWNlZTzuJBKnux3OyxquDJkChhymdGUop5h7O:JE0ePElCKANlcAnRJuDzs3Uoz9O

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Mirai family

Processes

  • /tmp/754c52a5236f701b2b83914f478c1bace8f1735a00f7702b3b70f80059b9be62.elf
    /tmp/754c52a5236f701b2b83914f478c1bace8f1735a00f7702b3b70f80059b9be62.elf
    1⤵
      PID:647

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads