Analysis

  • max time kernel
    0s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20240611-en
  • resource tags

    arch:armhfimage:debian9-armhf-20240611-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    22-01-2025 03:09

General

  • Target

    193.200.78.24-boatnet.arm5-2025-01-22T004950.elf

  • Size

    18KB

  • MD5

    2fac84f5eec635823fe13ce70a11a3bf

  • SHA1

    cebe735eaab88fcbd187dd565f42c98bad13988b

  • SHA256

    0afe0946c2fa99dad3fe4aebaa0a1d805221643fca59a165941fdbe012583a5a

  • SHA512

    118d6be60efa6c06c0c0c7aec5414991dd762c8bdaaf34bebeccad731c4abcab35185fedd6f8a5795ab46e1531176426bab123b97bd6d9eb427d1fb1ad8b2190

  • SSDEEP

    384:MjWzRV0P6iOwrkom0DRnVATuSlShu6NvmPWtUn+KMaFInihymdGUop5h5lO:6GV0P6+kom0tVAoNvm+to1qnis3UoznI

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Mirai family

Processes

  • /tmp/193.200.78.24-boatnet.arm5-2025-01-22T004950.elf
    /tmp/193.200.78.24-boatnet.arm5-2025-01-22T004950.elf
    1⤵
      PID:641

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads