Analysis

  • max time kernel
    0s
  • max time network
    156s
  • platform
    debian-12_armhf
  • resource
    debian12-armhf-20240221-en
  • resource tags

    arch:armhfimage:debian12-armhf-20240221-enkernel:6.1.0-17-armmp-lpaelocale:en-usos:debian-12-armhfsystem
  • submitted
    24/03/2025, 02:07

General

  • Target

    045878d5c5ff20c586f73206a82a443311a4c354f218090b98c3cfb3ea92279a.elf

  • Size

    16KB

  • MD5

    e63fb873f7f6e27920da3d875da280cb

  • SHA1

    dae51b46378b98eb4d98adcfa805e6b4713b2b2a

  • SHA256

    045878d5c5ff20c586f73206a82a443311a4c354f218090b98c3cfb3ea92279a

  • SHA512

    9995d69ed87e9fbc7bfe8a75f35db9b1271242a11c4d556986f22315699e919d368da6e0d607c04b4fab9345e4cff44a1da68fff81a9d14e4861046ed38412ce

  • SSDEEP

    384:inDN9PdRIB8LpUQf7l95FXnyIZx+Rh7qmdGUEpiaL:IhtbxfL5FzZx69q3UELL

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

MIRAI

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Mirai family

Processes

  • /tmp/045878d5c5ff20c586f73206a82a443311a4c354f218090b98c3cfb3ea92279a.elf
    /tmp/045878d5c5ff20c586f73206a82a443311a4c354f218090b98c3cfb3ea92279a.elf
    1⤵
      PID:709

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads