Behavioral task
behavioral1
Sample
0ec1dbd3e8adce86dd230c3f3b04253f0c8350eb9fa471b85c5927d3ebb71943.elf
Resource
debian9-armhf-en-20211208
0 signatures
150 seconds
General
-
Target
0ec1dbd3e8adce86dd230c3f3b04253f0c8350eb9fa471b85c5927d3ebb71943.zip
-
Size
25KB
-
MD5
277cc319c9235969cefa6667e4b736cb
-
SHA1
fa9321714acd1f97389b31990320befd656dddfe
-
SHA256
86f68a5e00abbc4e272d0ef39fca783982ab9192e907e4be049e01bb4d50ad8f
-
SHA512
33047b243fc5a02fc839dac5fa3ec406dca3ec8e8503660172300d47f9c9b5cd7853ca393bae0e1fab2a9b266e4b30b673f685618f96102984cb7fc52848c596
-
SSDEEP
768:QgmRRREe6XFWnQTCL4UEzcs3b9KKpI1KNd8rp:QtR2p0nYJzRL9KKpOKX8p
Score
10/10
Malware Config
Extracted
Family
mirai
C2
cnc.cattostresser.com
Signatures
-
Mirai family
Files
-
0ec1dbd3e8adce86dd230c3f3b04253f0c8350eb9fa471b85c5927d3ebb71943.zip.zip
Password: infected
-
0ec1dbd3e8adce86dd230c3f3b04253f0c8350eb9fa471b85c5927d3ebb71943.elf.elf linux arm