Analysis

  • max time kernel
    0s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20240611-en
  • resource tags

    arch:armhfimage:debian9-armhf-20240611-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    15-01-2025 03:49

General

  • Target

    eee75db010b9a91afdda9f49e5a4f3f5baf52e97ccbb0f36ec6f808495b56a53.elf

  • Size

    26KB

  • MD5

    a8aa33b2f9b138fb9b0509a6e79e15e5

  • SHA1

    3eda130572b3e5c3e3c24c195b67d31bc69270eb

  • SHA256

    eee75db010b9a91afdda9f49e5a4f3f5baf52e97ccbb0f36ec6f808495b56a53

  • SHA512

    909427a0a392df86bf0754345066b814fd1412f3edd863fae609c7304d5c2ef0105728d6971c760c3de97695835e9da71371e6398744e2ec4abb557968f02393

  • SSDEEP

    768:sfT3PpWahhBZ7Xgf5mjhMm2DOaGQLcs3UozrG:srfpzBSm2fGQFzi

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Mirai family

Processes

  • /tmp/eee75db010b9a91afdda9f49e5a4f3f5baf52e97ccbb0f36ec6f808495b56a53.elf
    /tmp/eee75db010b9a91afdda9f49e5a4f3f5baf52e97ccbb0f36ec6f808495b56a53.elf
    1⤵
      PID:664

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads