Analysis

  • max time kernel
    0s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20240611-en
  • resource tags

    arch:armhfimage:debian9-armhf-20240611-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    09-01-2025 02:48

General

  • Target

    9ef73495ea4a0f6cb4a8be0b227345d4107b2a3a7475a775ba3d4e9554791240.elf

  • Size

    18KB

  • MD5

    1258b2d49177ab4b8f8ec4927f318fc3

  • SHA1

    37d660dddcf4165ca93832224a37512f9648e755

  • SHA256

    9ef73495ea4a0f6cb4a8be0b227345d4107b2a3a7475a775ba3d4e9554791240

  • SHA512

    d8f769301a67b95d78b5413e36c2303e26f07854d1243c87aaa65b7c55a1daa51a4ad8df9cc1b0883a327447d055216dc780f5c7e3a783dffe27a6c17a77d43a

  • SSDEEP

    384:MjWzRV0P6iOwrkom0DRnVATuSlShu6NvmPWtUn+KMaagvwhymdGUop5h5lW:6GV0P6+kom0tVAoNvm+to1rws3UoznlW

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Mirai family

Processes

  • /tmp/9ef73495ea4a0f6cb4a8be0b227345d4107b2a3a7475a775ba3d4e9554791240.elf
    /tmp/9ef73495ea4a0f6cb4a8be0b227345d4107b2a3a7475a775ba3d4e9554791240.elf
    1⤵
      PID:660

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads