Analysis

  • max time kernel
    0s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20240611-en
  • resource tags

    arch:armhfimage:debian9-armhf-20240611-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    11-02-2025 20:42

General

  • Target

    boatnet.arm5.elf

  • Size

    18KB

  • MD5

    6ce41ed1b76f9d62c60b8416153d093a

  • SHA1

    72617f97e1719ccd9425ae05ed68d89b1878acd3

  • SHA256

    83e2fceae3786b02b97f761f7e00ba2775ad28952fc6ac2df2e0ed1d80416cb7

  • SHA512

    dd901ef8888d884ff6c6d122735f3397f81865666faaf14204b2e029f62d0f35fd151c3af245776823d1a85a28cddb48ff93109c63e8206ddb55cb3201cd294c

  • SSDEEP

    384:S7QMuRXokEVvwsOW9hxLzbiO1ESjh+lIzzOJVRyhymdGUop5hXO:S7Vk4R4sbhxLzbiOnEYzOJVAs3UozJO

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Mirai family

Processes

  • /tmp/boatnet.arm5.elf
    /tmp/boatnet.arm5.elf
    1⤵
      PID:663

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads