Analysis

  • max time kernel
    0s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20240611-en
  • resource tags

    arch:armhfimage:debian9-armhf-20240611-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    03-01-2025 03:25

General

  • Target

    3dfd6464fcbd89e44c24c1ffe162b66f614a7690ad49a85e0ef56d86fd71a58b.elf

  • Size

    18KB

  • MD5

    8ac893bc848fd5107ee358febd6493cc

  • SHA1

    7cff2c6af2b9867aef513f0a414d44806e2df2e3

  • SHA256

    3dfd6464fcbd89e44c24c1ffe162b66f614a7690ad49a85e0ef56d86fd71a58b

  • SHA512

    ad7eeddb671883eb2e9b2d750eb600891c011dabd41da96740f1bdb9e51e9be200fbbe071a4769abb25cb3449256c8945c3123c896eb1b172279b5856f08aea7

  • SSDEEP

    384:MjWzRV0P6iOwrkom0DRnVATuSlShu6NvmPWtUn+KMamhymdGUop5h5l9m:6GV0P6+kom0tVAoNvm+to1ms3Uoznl9m

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Mirai family

Processes

  • /tmp/3dfd6464fcbd89e44c24c1ffe162b66f614a7690ad49a85e0ef56d86fd71a58b.elf
    /tmp/3dfd6464fcbd89e44c24c1ffe162b66f614a7690ad49a85e0ef56d86fd71a58b.elf
    1⤵
      PID:651

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads