Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20240418-en
  • resource tags

    arch:armhfimage:debian9-armhf-20240418-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    29-06-2024 01:02

General

  • Target

    0d0defbfee4473d9ab5878e8974fbdecd34e7a7c2559cfe726ecea882a0790f8.elf

  • Size

    56KB

  • MD5

    342b4cb1e1a52cfe203a091204e8fee0

  • SHA1

    6a5747cce3c15f955662c13b33842c9a8273db36

  • SHA256

    0d0defbfee4473d9ab5878e8974fbdecd34e7a7c2559cfe726ecea882a0790f8

  • SHA512

    40c469534afe660c2fd8932f3792950dd907b41d851b6ac1bb3a40b1365c75dfdc3200ed2782a2e28292316cfa8fbb1e505bb121e4c2974c17c3657ba859dcd2

  • SSDEEP

    1536:9411ZTIKYHt+FnjrL790vgCJ6yDjlRY2+2huk:KmKYHeXL79141K2hT

Score
10/10

Malware Config

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Deletes itself 1 IoCs
  • Traces itself 1 IoCs

    Traces itself to prevent debugging attempts

  • Changes its process name 1 IoCs
  • Reads runtime system information 1 IoCs

    Reads data from /proc virtual filesystem.

  • Writes file to tmp directory 9 IoCs

    Malware often drops required files in the /tmp directory.

Processes

  • /tmp/0d0defbfee4473d9ab5878e8974fbdecd34e7a7c2559cfe726ecea882a0790f8.elf
    /tmp/0d0defbfee4473d9ab5878e8974fbdecd34e7a7c2559cfe726ecea882a0790f8.elf
    1⤵
    • Deletes itself
    • Traces itself
    • Changes its process name
    • Reads runtime system information
    • Writes file to tmp directory
    PID:638

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/638-1-0x00008000-0x0002940c-memory.dmp