Analysis

  • max time kernel
    0s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20240611-en
  • resource tags

    arch:armhfimage:debian9-armhf-20240611-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    10/03/2025, 02:59

General

  • Target

    e9864229fb4d25e82f8c13f6fb6bf8f5caa8dfb5071df0e440733b890506c395.elf

  • Size

    30KB

  • MD5

    38a27933778feb9672d2d88b65c28081

  • SHA1

    595ed27399602fb0c0e1a2380b018226810c66f2

  • SHA256

    e9864229fb4d25e82f8c13f6fb6bf8f5caa8dfb5071df0e440733b890506c395

  • SHA512

    1187852ceb9ba585dfbf4e6ccefa6a4a3e6159586ce4e3100b71a9d08f51bfa58a09d391951a841a089e63f11c3dd3521dd312e28c5b7ec3596f683216cca03f

  • SSDEEP

    768:N2aICfmJL5lrmxlLU0NQjli5fjdHwpTdPASP1sjq993U5:N2kfMFcxW0NQAhhHwpT7P1sjq96

Malware Config

Extracted

Family

mirai

Botnet

APEP

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Mirai family
  • Reads runtime system information 1 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/e9864229fb4d25e82f8c13f6fb6bf8f5caa8dfb5071df0e440733b890506c395.elf
    /tmp/e9864229fb4d25e82f8c13f6fb6bf8f5caa8dfb5071df0e440733b890506c395.elf
    1⤵
    • Reads runtime system information
    PID:654

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads