Analysis
-
max time kernel
0s -
max time network
161s -
platform
debian-12_armhf -
resource
debian12-armhf-20240221-en -
resource tags
arch:armhfimage:debian12-armhf-20240221-enkernel:6.1.0-17-armmp-lpaelocale:en-usos:debian-12-armhfsystem -
submitted
17/03/2025, 04:02
General
-
Target
ef148b27c6b7d2ccca17b547a8cc2c5c679d4071c81bb30f3d406c241d5ced8a.elf
-
Size
57KB
-
MD5
275ce7ffce592c304406f670c42794ff
-
SHA1
ea1df704706fe0e6675c4941cfb9951db1a70ee7
-
SHA256
ef148b27c6b7d2ccca17b547a8cc2c5c679d4071c81bb30f3d406c241d5ced8a
-
SHA512
a2880a4225e305d52b1558825f4cc0113a18fdfe9cf013a057ef4ffdfa90ea1a7bce6811b89e39f2e9eb84f2d0f7fe8a4e696d32c928cf1217566753bf75bd79
-
SSDEEP
1536:+CmkRfpmgAF2RLoSpnlPWvIgt13/PQotkq94b3JEra:+pOmgAFIll0BTQot9sv
Malware Config
Extracted
Family
mirai
Botnet
UNSTABLE
Signatures
-
Mirai family
-
Deletes itself 1 IoCs
pid Process 713 ef148b27c6b7d2ccca17b547a8cc2c5c679d4071c81bb30f3d406c241d5ced8a.elf -
description ioc Process File opened for reading /proc/self/exe ef148b27c6b7d2ccca17b547a8cc2c5c679d4071c81bb30f3d406c241d5ced8a.elf