Analysis

  • max time kernel
    0s
  • max time network
    147s
  • platform
    debian-12_armhf
  • resource
    debian12-armhf-20240221-en
  • resource tags

    arch:armhfimage:debian12-armhf-20240221-enkernel:6.1.0-17-armmp-lpaelocale:en-usos:debian-12-armhfsystem
  • submitted
    12-01-2025 02:31

General

  • Target

    5c2fdf68ca9e702037410c43e4b9715480f9862fe5ecb51404bd9b6b9616a1a1.elf

  • Size

    39KB

  • MD5

    42cb4a27f4d8f13ccf98d0b04c4583d8

  • SHA1

    cc1b9bd42b4bb0799737437feeafcf0823d7d753

  • SHA256

    5c2fdf68ca9e702037410c43e4b9715480f9862fe5ecb51404bd9b6b9616a1a1

  • SHA512

    49194dd00555db53555a49ea58b5ca70316811e1f4ee4d896d6f9e86c597550517c2269d89fe5789cbb090bb7be5bb4312f7aeebbec4bb593519dba644d61586

  • SSDEEP

    768:xGPjXBOTsh1aqh3kosh+IkLpFw71qB7IuszFKwMKBJdr8HuA98M9q3UELyB:0LYptVh0whqFIlQ/Kr8HuvLO

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Mirai family
  • Reads runtime system information 1 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/5c2fdf68ca9e702037410c43e4b9715480f9862fe5ecb51404bd9b6b9616a1a1.elf
    /tmp/5c2fdf68ca9e702037410c43e4b9715480f9862fe5ecb51404bd9b6b9616a1a1.elf
    1⤵
    • Reads runtime system information
    PID:707

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads