Analysis

  • max time kernel
    0s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20240611-en
  • resource tags

    arch:armhfimage:debian9-armhf-20240611-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    07/03/2025, 09:47

General

  • Target

    ub8ehJSePAfc9FYqZIT6.arm5.elf

  • Size

    19KB

  • MD5

    76b84af60cfe7784ed729feb295abfba

  • SHA1

    e402aa70ca8a1b49002ee0d9540094a75098ef2b

  • SHA256

    083f7282fc80bb6586c8fd92fc139e365c9fb1d11779e7ac25ec750d06e80688

  • SHA512

    e6dab8462f43f9df24548ba2fcca743c2726b8bb8791548321f684c0223707ecfd3626846b154e899829b62e017faf87156a40b306d826d13857bc491f3dd21d

  • SSDEEP

    384:wABdaR4qa17lJdyTyvPsSB8DQyQMLqqQmJXBvRh7qmdGUEpia66:vXN62vPsdJQOEmJxvR9q3UELX

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Mirai family

Processes

  • /tmp/ub8ehJSePAfc9FYqZIT6.arm5.elf
    /tmp/ub8ehJSePAfc9FYqZIT6.arm5.elf
    1⤵
      PID:662

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads