Analysis
-
max time kernel
118s -
max time network
151s -
platform
debian-9_mips -
resource
debian9-mipsbe-20240418-en -
resource tags
arch:mipsimage:debian9-mipsbe-20240418-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipssystem -
submitted
09/03/2025, 11:12
General
-
Target
u.elf
-
Size
32KB
-
MD5
4ff586faf489f7a2fc1c62eb772793be
-
SHA1
156e6cf90b517b1752babef075f2186f6cfa964b
-
SHA256
253fbabcb4220473e8e6bee85edc1bae835e7a186a4ef223de32b5d41d5736ce
-
SHA512
6974882489bdca6393c7fe2616b5826f06bd8599992c9cc5ab45fcce1a1d2f9bf6c72ccb1d1cd291d3b742e4444583bfb83ad5b6594eab24c3358f56f22e9f8e
-
SSDEEP
768:UQE0R41Re844tDE07xrT9ftDeJVTsRnUay8htgjAAJgGlzDpUYsB:UQ6142i07xe9V9lVqYq
Malware Config
Extracted
Family
mirai
Botnet
APEP
Signatures
-
Mirai family
-
Contacts a large (213231) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Changes its process name 1 IoCs
description ioc pid Process Changes the process name, possibly in an attempt to hide itself ȭ��������Ȥ����� 743 u.elf -
description ioc Process File opened for reading /proc/self/exe u.elf -
Writes file to tmp directory 4 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/Ŏ��ŝ�������� u.elf File opened for modification /tmp/笭�祡��翩������� u.elf File opened for modification /tmp/Ŏ��Ŭ������۵��������� u.elf File opened for modification /tmp/笭�玜�������迩������� u.elf