Analysis

  • max time kernel
    0s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20240729-en
  • resource tags

    arch:armhfimage:debian9-armhf-20240729-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    19-01-2025 17:57

General

  • Target

    boatnet.arm5.elf

  • Size

    24KB

  • MD5

    aaa080302eb642146746259ce9b7fadd

  • SHA1

    e462edbf6a7806244fa64c6ce93385b9384dac7b

  • SHA256

    17a5b60140d1f4b70893022ab97537870877e0db7a5e4153c0e32030c787a370

  • SHA512

    8844f06b28e397264cc0c0e20184282f0b939c9b31bac890dbae163a14559a8320bc9b02456c2799717665faa17e7372504a74b0f1530accee37cf4be1967185

  • SSDEEP

    768:VSqiL4O2iAOTmVNCeV2ENXA/Beq5NqLs3Uoz9ml:VSqicO2ilMgoJwBz/zG

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Mirai family

Processes

  • /tmp/boatnet.arm5.elf
    /tmp/boatnet.arm5.elf
    1⤵
      PID:669

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads