Analysis

  • max time kernel
    0s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20240611-en
  • resource tags

    arch:armhfimage:debian9-armhf-20240611-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    10-01-2025 02:46

General

  • Target

    916e45e8de0dd65cb3b64752f1e337c1867e73820fe52d0326724203b4f8d030.elf

  • Size

    22KB

  • MD5

    9702141011244a7d5803a84a8ae8d369

  • SHA1

    c530734323ef5c631437791bb6c92fde4b2bb853

  • SHA256

    916e45e8de0dd65cb3b64752f1e337c1867e73820fe52d0326724203b4f8d030

  • SHA512

    d119864770e74e9551dac8bb9821f10d1f7c4453c7a0da567e7800f0722689e0d7c18cdb29f408d02b0a28b802ab97fa9ae0d88ed8911389f0a4f81af6d6c163

  • SSDEEP

    384:Y//stS84NQy+ibbFgScu7mIsPgkNQiJFjblOUeuZTBnIWqmBY/iZhy5dhymdGUoF:KNQybbbDvmTQiJRbIUdl/wds3Uozum

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Mirai family

Processes

  • /tmp/916e45e8de0dd65cb3b64752f1e337c1867e73820fe52d0326724203b4f8d030.elf
    /tmp/916e45e8de0dd65cb3b64752f1e337c1867e73820fe52d0326724203b4f8d030.elf
    1⤵
      PID:674

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads