Analysis

  • max time kernel
    0s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20240611-en
  • resource tags

    arch:armhfimage:debian9-armhf-20240611-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    16-02-2025 02:15

General

  • Target

    1b2bcc335bc1ca4eaf35c7b0e4e5c2d5afad0f7d344e287952a9577c42353e9c.elf

  • Size

    23KB

  • MD5

    77c3e7722ca9c80b65f0604cffffdd55

  • SHA1

    d526570c5fdda3739c0429a097fd15abe4df0d19

  • SHA256

    1b2bcc335bc1ca4eaf35c7b0e4e5c2d5afad0f7d344e287952a9577c42353e9c

  • SHA512

    64fe1429f419f370878aada76ed5abd4bdb42d1659361e1019b63df282b807f8d87ba11786f903789168fbc3d2d42e8b1c918fd5947f5bc8a09069495f685dfe

  • SSDEEP

    384:NByd237fzXV6KBLQlG3rnmzJx8gbm0+7M8W6LSiS4x40ZhymdGUop5huf:NByafzltX3Tmzq7PLS6x1s3UozMf

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

SORA

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Mirai family

Processes

  • /tmp/1b2bcc335bc1ca4eaf35c7b0e4e5c2d5afad0f7d344e287952a9577c42353e9c.elf
    /tmp/1b2bcc335bc1ca4eaf35c7b0e4e5c2d5afad0f7d344e287952a9577c42353e9c.elf
    1⤵
      PID:666

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads