Analysis

  • max time kernel
    0s
  • max time network
    140s
  • platform
    debian-12_armhf
  • resource
    debian12-armhf-20250410-en
  • resource tags

    arch:armhfimage:debian12-armhf-20250410-enkernel:6.1.0-17-armmp-lpaelocale:en-usos:debian-12-armhfsystem
  • submitted
    11/04/2025, 09:10

General

  • Target

    病毒样本/29f7bb5c960036be3c3d945d23ef7fc4

  • Size

    31KB

  • MD5

    29f7bb5c960036be3c3d945d23ef7fc4

  • SHA1

    d0c1c0a0b1d2d08a18da988629ddfaa41d3daafc

  • SHA256

    7746642a255d4fb337c0deab9790bf5910efe01223c8f9b531f79be2ba59b7dd

  • SHA512

    99f6f4f9c0def6f4f97b97a9b904bc450f287289271cc17fe5f4812d64b2a596205eb0c14cfcb4a1e6776ef85876ddeb92df560628d42e8527993616573cae5a

  • SSDEEP

    768:MFXOsxs3AU6s1PUeMdl1S5WmZ49qfmpO9q3UEL5s:MVA3AQkPKWmig+pzLq

Malware Config

Extracted

Family

mirai

Botnet

MIRAI

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Mirai family
  • Reads runtime system information 1 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/病毒样本/29f7bb5c960036be3c3d945d23ef7fc4
    /tmp/病毒样本/29f7bb5c960036be3c3d945d23ef7fc4
    1⤵
    • Reads runtime system information
    PID:759

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads