Behavioral task
behavioral1
Sample
bee1bad9afff6831e7182d00ca692c98c53c5c1a9f6025818dd58d4c6113e11b.elf
Resource
debian9-armhf-20221111-en
0 signatures
150 seconds
General
-
Target
bee1bad9afff6831e7182d00ca692c98c53c5c1a9f6025818dd58d4c6113e11b.zip
-
Size
39KB
-
MD5
f9b7e202152e54b9856deff8341427e9
-
SHA1
e34e23c807722053e1a8b7433f2afc59a9c73be8
-
SHA256
20e3905f3e56a43456934e2eac31c493c04d0e08e66954f7783e58c3f94f0a23
-
SHA512
198640c60dcc2e31167c2a747046d745434beb7f0e5da3e5973600cb3b95272ade106b8fb45cc31c3736b91788414b4021c5d0a8d553a19a65a18544fd3ef4d2
-
SSDEEP
768:xkOhLx/t9wLj9CpKP9qUG4XYxyiXRqVdp3byjoE7TvUav+SzoOljr+bc:xkOhV/t9u9sKG4I02odp3bfEPHv+SzoU
Score
10/10
Malware Config
Extracted
Family
mirai
C2
cnc.cattostresser.com
Signatures
-
Mirai family
Files
-
bee1bad9afff6831e7182d00ca692c98c53c5c1a9f6025818dd58d4c6113e11b.zip.zip
Password: infected
-
bee1bad9afff6831e7182d00ca692c98c53c5c1a9f6025818dd58d4c6113e11b.elf.elf linux arm