Analysis

  • max time kernel
    0s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20240729-en
  • resource tags

    arch:armhfimage:debian9-armhf-20240729-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    05-01-2025 02:30

General

  • Target

    a31db554dc105585006496452d03a3994a31768b1c8917daf36ba077b06039cd.elf

  • Size

    18KB

  • MD5

    207005cc91ffe7b25c7ff2bc1859333b

  • SHA1

    c1fbfa380a2c2089584625e55f4bc6346b6671b9

  • SHA256

    a31db554dc105585006496452d03a3994a31768b1c8917daf36ba077b06039cd

  • SHA512

    ee29f43c4f1bd4bb809778e45cdb8ae557a3d591b61f2486cc12c6b114a8260002aa5268c8a5d93896584bb42b656b4eae03bc7ec917a051c5cce9b9a2866e90

  • SSDEEP

    384:MnfzRV0P6iOwrkom0DRnVATuSlShu6NvmPWtUn+KMaBhymdGUop5h5l0:2dV0P6+kom0tVAoNvm+to1Bs3Uoznl0

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Mirai family

Processes

  • /tmp/a31db554dc105585006496452d03a3994a31768b1c8917daf36ba077b06039cd.elf
    /tmp/a31db554dc105585006496452d03a3994a31768b1c8917daf36ba077b06039cd.elf
    1⤵
      PID:658

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads