Analysis

  • max time kernel
    0s
  • max time network
    144s
  • platform
    debian-12_armhf
  • resource
    debian12-armhf-20250410-en
  • resource tags

    arch:armhfimage:debian12-armhf-20250410-enkernel:6.1.0-17-armmp-lpaelocale:en-usos:debian-12-armhfsystem
  • submitted
    11/04/2025, 09:10

General

  • Target

    病毒样本/27e04e3e0427e779ee43db42783abbaf

  • Size

    45KB

  • MD5

    27e04e3e0427e779ee43db42783abbaf

  • SHA1

    86bd80a7ab0505c885cd037e1801f6fb1bd0e00c

  • SHA256

    ba3cc49922fa9a19f986d958ffb7441cc904752932531b2a9d1058aa674baf81

  • SHA512

    7175a3b3cd8d048e25d9f5889262013d8d99e9059950b59613d8dc982e15336991867eb0cad6dd72d7031618724188c810ca7d5bf8979035b6ad0c63b87d27e6

  • SSDEEP

    768:xM2maAhFSHUdhghXgwVNrbC5ejzGu9q3UELyPmyYKSJxJNbvF5VNXOxPvlvY:O2YQ0dhWXt/r+mcLYmyYhJZ3PO9NvY

Malware Config

Extracted

Family

mirai

Botnet

SORA

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Mirai family
  • Reads runtime system information 1 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/病毒样本/27e04e3e0427e779ee43db42783abbaf
    /tmp/病毒样本/27e04e3e0427e779ee43db42783abbaf
    1⤵
    • Reads runtime system information
    PID:764

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads