Behavioral task
behavioral1
Sample
e8d34412fd7d15df6889a3d5faf5e105dfb4c204e9d8d38928de7777dffb0470.elf
Resource
debian9-armhf-en-20211208
0 signatures
150 seconds
General
-
Target
7ea0cf559c743204115992b509252d56.bin
-
Size
39KB
-
MD5
c66ffec69d54643c6c7e6625eb63f379
-
SHA1
87c52385756bed85105f17cc96a65a6f0234b250
-
SHA256
8dbe268a1ef7d6a0a146f56695041e56726e9daf4e4260f6c588c7ab8918b5bf
-
SHA512
651128ae59375145e8245bfa85bfa2a74531f264429b9ee8cde8e32eb4aed4af6096e314ade59726cbe8761e42e1d7315e1b1f5b10169bfd527db6bbdb27553d
-
SSDEEP
768:LT+2eQmsd6eEAB2AxQKKEopA1X2th43PEX/NS9/ZE7GNvTpgYDYWIaXoY8:LymDCABh1hf2t3X1ui7GFRDzoz
Score
10/10
Malware Config
Extracted
Family
mirai
C2
botnet.lostostore.site
Signatures
-
Mirai family
Files
-
7ea0cf559c743204115992b509252d56.bin.zip
Password: infected
-
e8d34412fd7d15df6889a3d5faf5e105dfb4c204e9d8d38928de7777dffb0470.elf.elf linux arm