Analysis

  • max time kernel
    0s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20240611-en
  • resource tags

    arch:armhfimage:debian9-armhf-20240611-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    05-07-2024 04:02

General

  • Target

    79203d066d6f68cbb7d57e127b335e1b2e428aa418f1d150a35fb6b3beaa3f71.elf

  • Size

    19KB

  • MD5

    feb84603c2b803291bef31ba1d10a404

  • SHA1

    89c8ff9a54946909b7db50eacc0ccc832bef340f

  • SHA256

    79203d066d6f68cbb7d57e127b335e1b2e428aa418f1d150a35fb6b3beaa3f71

  • SHA512

    005c55ead05279df761892cb9e52053f8f5b2f659db603450203683a9961a160f3c6129a0ec4248d079444961ff41cdf36793b0abf57ad2155a5d5cd0b8e87c5

  • SSDEEP

    384:WpeZY5qyxOKkn6C9DadTwkRh5Zj+xp8C1KLIz4neDCMVGHmdGU5EIZ:WpeZY7OAC9DaZnfXjShKkfCCGH3U1Z

Score
10/10

Malware Config

Signatures

  • Mirai

    Mirai is a prevalent Linux malware infecting exposed network devices.

  • Reads runtime system information 1 IoCs

    Reads data from /proc virtual filesystem.

Processes

  • /tmp/79203d066d6f68cbb7d57e127b335e1b2e428aa418f1d150a35fb6b3beaa3f71.elf
    /tmp/79203d066d6f68cbb7d57e127b335e1b2e428aa418f1d150a35fb6b3beaa3f71.elf
    1⤵
    • Reads runtime system information
    PID:647

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/647-1-0x00008000-0x0001ba28-memory.dmp