Analysis

  • max time kernel
    0s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20240729-en
  • resource tags

    arch:armhfimage:debian9-armhf-20240729-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    05-01-2025 01:00

General

  • Target

    95601c0e7521db857b5640e1ec5e15ef42b0c73d6a5724877a424328a667fc1a.elf

  • Size

    19KB

  • MD5

    117dca14777716182b4757e92a3c5522

  • SHA1

    51ec1fe8f6b76c8dc7bc066ebb02185b6f6480e9

  • SHA256

    95601c0e7521db857b5640e1ec5e15ef42b0c73d6a5724877a424328a667fc1a

  • SHA512

    5090553abd6c658b22266f7820df2ebdedb2c4a2420ba9d8acd4e90fbd5c2f92390875a3abcdf9c8ef84054e49eb23808d36e05ae66926fe1ef68b40ecdacf46

  • SSDEEP

    384:d3meRngp8Bc8ZoScE5jrecZpuYdruCur2WNTh7qmdGUEpiaMyr:9RngbScMjre4pHdruCuaWZ9q3UEL/r

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Mirai family

Processes

  • /tmp/95601c0e7521db857b5640e1ec5e15ef42b0c73d6a5724877a424328a667fc1a.elf
    /tmp/95601c0e7521db857b5640e1ec5e15ef42b0c73d6a5724877a424328a667fc1a.elf
    1⤵
      PID:645

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads