Analysis

  • max time kernel
    0s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20240611-en
  • resource tags

    arch:armhfimage:debian9-armhf-20240611-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    20-01-2025 04:29

General

  • Target

    80e3befef83d35d58656df4fca55291455497a9c76fbf758e3cdb913e16b21ff.elf

  • Size

    33KB

  • MD5

    b9f099aa26d698c360178a28d52572f3

  • SHA1

    77ae4f61f9856cd44d4b78ddfe3daa18fc4660cd

  • SHA256

    80e3befef83d35d58656df4fca55291455497a9c76fbf758e3cdb913e16b21ff

  • SHA512

    1ae0fcc4673a050c106d8299e223c2a99694f2c6566a5f07ac33bef4662c37c094826985352e86ab16ad8b9207f5a0fac2e121d7305bae1c3b1eed5f6d1f5666

  • SSDEEP

    768:9niR/7jMRG3+xoGl+LtRA1HukYcNy7Z/9q3UEL6g:9nA7V3+OGlK2Hu3csuLZ

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Mirai family
  • Reads runtime system information 1 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/80e3befef83d35d58656df4fca55291455497a9c76fbf758e3cdb913e16b21ff.elf
    /tmp/80e3befef83d35d58656df4fca55291455497a9c76fbf758e3cdb913e16b21ff.elf
    1⤵
    • Reads runtime system information
    PID:650

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads