Analysis

  • max time kernel
    0s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20240611-en
  • resource tags

    arch:armhfimage:debian9-armhf-20240611-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    13-01-2025 07:07

General

  • Target

    boatnet.arm6.elf

  • Size

    25KB

  • MD5

    169c3846658010089599f65ef66688f4

  • SHA1

    430c281b77977c0d1798864afa2b097ef2456077

  • SHA256

    02f1d8d7701ebcabbb759633613e119160a4461fa34b9b353fbb641e71859a2c

  • SHA512

    027bfbca37d98e4a87b9182dae5309a629da57f0baf2beb4bfa074ee242abc51f50330319fe913a1297ecadac8319e9c675134d9e8e146d5d4abffe438cae074

  • SSDEEP

    768:G4jxUk6e3aD2w+pyOXpriX6W869q3UELEZ:G4jqk6LD2rpyYrJWoLw

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Mirai family
  • Reads runtime system information 1 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/boatnet.arm6.elf
    /tmp/boatnet.arm6.elf
    1⤵
    • Reads runtime system information
    PID:658

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads