Behavioral task
behavioral1
Sample
8d1dda69b38556b9655eb4ea41296b8d45b829fed7ec45b495e27a41c39dceb2.elf
Resource
debian9-armhf-20221111-en
6 signatures
150 seconds
General
-
Target
ca16befe59645e3791ced682c5ff5c9a.bin
-
Size
66KB
-
MD5
e643239f408860e194528f3781d40370
-
SHA1
f9e97794242a1731ac0f05310a7f2830a7174821
-
SHA256
fe39bea08b35c1d67aa89e72827db8a1f4a66a16d7436c311a624fff08e7d03f
-
SHA512
376dd23012621c6a611eb944f9af2d0ecdc33b48949953ad9d306c2f0a3e8ac19f319e79d820d845337eda5a7f75c1cdfa57690a5a459c4cd4010e6f9b7dab5d
-
SSDEEP
1536:+3F94B7BcrW9hsVJCI5mcfMl+btY8PA7MOMC74k:SeB7urWhsVJ/5mcfM4uOOB7r
Score
10/10
Malware Config
Extracted
Family
mirai
C2
botnet.lostostore.site
Signatures
-
Mirai family
Files
-
ca16befe59645e3791ced682c5ff5c9a.bin.zip
Password: infected
-
8d1dda69b38556b9655eb4ea41296b8d45b829fed7ec45b495e27a41c39dceb2.elf.elf linux arm