Behavioral task
behavioral1
Sample
0ec1dbd3e8adce86dd230c3f3b04253f0c8350eb9fa471b85c5927d3ebb71943.elf
Resource
debian9-armhf-20221111-en
0 signatures
150 seconds
General
-
Target
0ec1dbd3e8adce86dd230c3f3b04253f0c8350eb9fa471b85c5927d3ebb71943.zip
-
Size
25KB
-
MD5
18c87c8c9992d6dab9e9581967de489c
-
SHA1
ad9bb10e011c7a4721650fab1fec2110aa34f815
-
SHA256
26ff366d177836c350ab33adc35a50d31947409138e52ffa3ce53897d548aec6
-
SHA512
44ecdf0287c15596f18c4a9f240e476cd83a961c7083521acf53fac3d7862941b5636a69955773383581e5459c32235536b1e563f2da6d02b8dd3a4175fe50ff
-
SSDEEP
384:Dj0/pcVQ8vfgN7TAocdRTS7DqpBmn3rcqPLstyigbdXIAblPMWZaKJjfp:DjYmVQgfgFcoc3e7Dl7FP6lcNxNaKpfp
Score
10/10
Malware Config
Extracted
Family
mirai
C2
cnc.cattostresser.com
Signatures
-
Mirai family
Files
-
0ec1dbd3e8adce86dd230c3f3b04253f0c8350eb9fa471b85c5927d3ebb71943.zip.zip
Password: infected
-
0ec1dbd3e8adce86dd230c3f3b04253f0c8350eb9fa471b85c5927d3ebb71943.elf.elf linux arm