Analysis

  • max time kernel
    0s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20240611-en
  • resource tags

    arch:armhfimage:debian9-armhf-20240611-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    08/03/2025, 05:52

General

  • Target

    411e3925b26a612d2b071b05e7f70d27d5fe295a71e820ed5bf9a59c9524efab.elf

  • Size

    17KB

  • MD5

    cdd270ca60a1e564872ba8135222a0dd

  • SHA1

    69b82a617b6167b8c215f1b99472cb976daa1dec

  • SHA256

    411e3925b26a612d2b071b05e7f70d27d5fe295a71e820ed5bf9a59c9524efab

  • SHA512

    eff8be159b07472d851c9459908a7c036c7dc4a74ddbbddaddae6ed58426c640763dd148620721c9f5de47c610041db8348cb5f874531755a76f7de8ba496bc5

  • SSDEEP

    384:mIVHDQ2A361ZCBZLS6xrTC7lQikAhhymdGUop5hKc:mI9D9A3s2ZLvjOs3UozYc

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

LZRD

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Mirai family

Processes

  • /tmp/411e3925b26a612d2b071b05e7f70d27d5fe295a71e820ed5bf9a59c9524efab.elf
    /tmp/411e3925b26a612d2b071b05e7f70d27d5fe295a71e820ed5bf9a59c9524efab.elf
    1⤵
      PID:660

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads