Analysis

  • max time kernel
    0s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20240418-en
  • resource tags

    arch:armhfimage:debian9-armhf-20240418-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    01-07-2024 01:05

General

  • Target

    35b9c1b9398b97927db82d92ae740a4e187708d8f9081c8454880eab837b6406.elf

  • Size

    27KB

  • MD5

    4aaf16a709a79f3d8a9c78e64e87f1bf

  • SHA1

    6caac9163e6627ecff8dc4dd594b6a4f7a02bb5a

  • SHA256

    35b9c1b9398b97927db82d92ae740a4e187708d8f9081c8454880eab837b6406

  • SHA512

    29a29a39c706c5b34181e8396bdae71bf1acecd04067035b8977c58204d5f6dc34f34b52c7931161c5e36e3af3e98a53b9e0f2ad7631117d3a411a8f266527b7

  • SSDEEP

    384:E8t/koxisa34beDtZwbXi2Cn9IHUNljUCqzic9viO1vosVsUdpKhymdGUop5hv:E4soTAZSi2CtZUzicJ11gzoss3UozZ

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

SORA

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Reads runtime system information 1 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/35b9c1b9398b97927db82d92ae740a4e187708d8f9081c8454880eab837b6406.elf
    /tmp/35b9c1b9398b97927db82d92ae740a4e187708d8f9081c8454880eab837b6406.elf
    1⤵
    • Reads runtime system information
    PID:643

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/643-1-0x00008000-0x00020ffc-memory.dmp