Analysis

  • max time kernel
    0s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20240611-en
  • resource tags

    arch:armhfimage:debian9-armhf-20240611-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    07/03/2025, 06:06

General

  • Target

    aa1b23f6c27930cebcae0b87a7fceb3b43a64536f43c54f811e55180cd8f1660.elf

  • Size

    15KB

  • MD5

    74b8a3f7075369e1986d90d285fdd40a

  • SHA1

    d5d2d3e5e363194821d96dc82d75a4a1253bf421

  • SHA256

    aa1b23f6c27930cebcae0b87a7fceb3b43a64536f43c54f811e55180cd8f1660

  • SHA512

    ac3bf1d2429167324495efb1d0f5d82dfaa8cc19f5fa251d68fff947f9e0a26fa41c620cd84f7b65cbcb9f4f1637fd6399bbf4f491c39cb1dfb23498c55b1a68

  • SSDEEP

    384:47AmG5ctQAaljhSt1b8qDoWBhx2o7/ehTp/ftB3:sMmtQjl0dRV5TedR3

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Mirai family

Processes

  • /tmp/aa1b23f6c27930cebcae0b87a7fceb3b43a64536f43c54f811e55180cd8f1660.elf
    /tmp/aa1b23f6c27930cebcae0b87a7fceb3b43a64536f43c54f811e55180cd8f1660.elf
    1⤵
      PID:646

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads