Analysis

  • max time kernel
    0s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20240611-en
  • resource tags

    arch:armhfimage:debian9-armhf-20240611-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    16-02-2025 04:34

General

  • Target

    dc07a07d1d0b4db0ed8ab9c9d487f66745e800580744eaf051e13bf0a9e02f6a.elf

  • Size

    51KB

  • MD5

    9b35ab97d28f085016bd953416cdf467

  • SHA1

    0a2247dc2ee2f81ccfd658abf48c41bef5dab806

  • SHA256

    dc07a07d1d0b4db0ed8ab9c9d487f66745e800580744eaf051e13bf0a9e02f6a

  • SHA512

    1fccc64fc9f39cfbea4cb0e976acf07d1622c8f5ac71e28649ffe813eb3105f14e52e2a3017957c72d35ff076f2c927264bedadd994a93c0ed8a52b996ed5395

  • SSDEEP

    1536:x3kMg2TClHg0qtFgGUgTEEJDHL1LrHnOImw8:tg2+lAhDp3oE1LtDOD

Malware Config

Extracted

Family

mirai

Botnet

SORA

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Mirai family
  • Reads runtime system information 1 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/dc07a07d1d0b4db0ed8ab9c9d487f66745e800580744eaf051e13bf0a9e02f6a.elf
    /tmp/dc07a07d1d0b4db0ed8ab9c9d487f66745e800580744eaf051e13bf0a9e02f6a.elf
    1⤵
    • Reads runtime system information
    PID:650

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads