Analysis

  • max time kernel
    0s
  • max time network
    128s
  • platform
    debian-12_armhf
  • resource
    debian12-armhf-20240418-en
  • resource tags

    arch:armhfimage:debian12-armhf-20240418-enkernel:6.1.0-17-armmp-lpaelocale:en-usos:debian-12-armhfsystem
  • submitted
    07-01-2025 19:47

General

  • Target

    botnet.arm6.elf

  • Size

    40KB

  • MD5

    fea8093287a352e1fe9304e714b1718f

  • SHA1

    638ede402c3e9ce5d54ecafe250ffe784f847d08

  • SHA256

    c26accc48e3ee4d15f98e473268269e2f78f3bae9d2e96f1eeede5270c210aa4

  • SHA512

    321b0cc4263eef6ffbeba0e63ed59eab7f4d5e5b863944f28bc5b64c4e44ecf2fd4dc9584162c67cc418ea3b55e57ec8f262a3582b94207f27b2e9dd6c20ecb8

  • SSDEEP

    768:JKW2JjmGK2o8UOncwfKJWfFoKpgLqb9i/9jo39jGsq3UIKx:5mjmGO8UOOJdKp3bS9jyqi

Malware Config

Extracted

Family

mirai

Botnet

MIRAI

C2

raw.igxhost.ru

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Mirai family
  • Reads runtime system information 1 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/botnet.arm6.elf
    /tmp/botnet.arm6.elf
    1⤵
    • Reads runtime system information
    PID:712

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads