Analysis

  • max time kernel
    0s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20240611-en
  • resource tags

    arch:armhfimage:debian9-armhf-20240611-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    13-02-2025 05:55

General

  • Target

    boatnet.arm6.elf

  • Size

    26KB

  • MD5

    9271a6f214d79908614dc8d2509aa66e

  • SHA1

    9f1ffc7d2cfc99264520a3f0bf053e38f1d10c59

  • SHA256

    4ec4ff36077b82e16180834883f89012b670b8d25a0cbe4470f59d96708b0ee2

  • SHA512

    52989a4006fda9dd33430b175401e220586f7763a4fd4752d4177c97d68452744df7f74f8e62709d0c23d50772277f179a31fdc745cddc476c1a083067bbfbd0

  • SSDEEP

    768:MMKyhegCCMqf8LxlFYIxrXR59ylz+q9q3UELOr:DKy4qf8LxIS4lz+fLC

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Mirai family
  • Reads runtime system information 1 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/boatnet.arm6.elf
    /tmp/boatnet.arm6.elf
    1⤵
    • Reads runtime system information
    PID:648

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads