Analysis
-
max time kernel
0s -
max time network
141s -
platform
debian-12_armhf -
resource
debian12-armhf-20240221-en -
resource tags
arch:armhfimage:debian12-armhf-20240221-enkernel:6.1.0-17-armmp-lpaelocale:en-usos:debian-12-armhfsystem -
submitted
01-07-2024 01:21
General
-
Target
dd6b3f2fd05cdfb14ef09ea29a12bc8f6c1acde6b5ea3ee1a9046f38eca35710.elf
-
Size
32KB
-
MD5
fcaad0f93fbd1a4877f75976d19d7d5e
-
SHA1
d28d4fc562e087c5ad31aa204abc48921fb10a84
-
SHA256
dd6b3f2fd05cdfb14ef09ea29a12bc8f6c1acde6b5ea3ee1a9046f38eca35710
-
SHA512
a2cd83c45a2f93782780aec65aaa0964eaee4d91747d93d5b886f3a3d3881a063055677f23465d81a8e5c015e36534ae8ea82b60f42753aff0359ba840bb2d58
-
SSDEEP
768:9oiWiO031vOQJK68VuQsj6X0w9KkZll8a9q3UEL5IB:9orm1vOaNBvj6EhnPL6
Malware Config
Extracted
Family
mirai
Botnet
SORA
Signatures
-
Reads runtime system information 1 IoCs
Reads data from /proc virtual filesystem.
Processes:
dd6b3f2fd05cdfb14ef09ea29a12bc8f6c1acde6b5ea3ee1a9046f38eca35710.elfdescription ioc process File opened for reading /proc/self/exe dd6b3f2fd05cdfb14ef09ea29a12bc8f6c1acde6b5ea3ee1a9046f38eca35710.elf
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/708-1-0x00008000-0x0002db18-memory.dmp