Analysis

  • max time kernel
    0s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20240729-en
  • resource tags

    arch:armhfimage:debian9-armhf-20240729-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    11-01-2025 22:47

General

  • Target

    camp.arm6.elf

  • Size

    39KB

  • MD5

    42cb4a27f4d8f13ccf98d0b04c4583d8

  • SHA1

    cc1b9bd42b4bb0799737437feeafcf0823d7d753

  • SHA256

    5c2fdf68ca9e702037410c43e4b9715480f9862fe5ecb51404bd9b6b9616a1a1

  • SHA512

    49194dd00555db53555a49ea58b5ca70316811e1f4ee4d896d6f9e86c597550517c2269d89fe5789cbb090bb7be5bb4312f7aeebbec4bb593519dba644d61586

  • SSDEEP

    768:xGPjXBOTsh1aqh3kosh+IkLpFw71qB7IuszFKwMKBJdr8HuA98M9q3UELyB:0LYptVh0whqFIlQ/Kr8HuvLO

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Mirai family
  • Reads runtime system information 1 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/camp.arm6.elf
    /tmp/camp.arm6.elf
    1⤵
    • Reads runtime system information
    PID:660

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads