General

  • Target

    a170b3986952c17140c7f3a676331fec123839fa97a613e9d58c6db3edf6d89d_JC.elf

  • Size

    70KB

  • MD5

    57d46478c3f935ea53adb209763bce55

  • SHA1

    9dce7232a8e2582deab5671e7ca1e6a40ef6600c

  • SHA256

    a170b3986952c17140c7f3a676331fec123839fa97a613e9d58c6db3edf6d89d

  • SHA512

    fcc23243c73aee080cc88b05eae86dbff56f72daecf0aabf53f4038dbdc9f5bec75ac483790640733ff61d53bc86b26ad83a93597e7db196a94ed486a75a7f3c

  • SSDEEP

    1536:k+1UbOahCfdN6OHDyK9+EjOdzcDDDVhPX51t/MKq3+3+:k+1UbOahCfdN6OHhCEDDV8K

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

PEDO

C2

cnc.wq.gy

bot.wq.gy

Signatures

Files

  • a170b3986952c17140c7f3a676331fec123839fa97a613e9d58c6db3edf6d89d_JC.elf
    .elf linux arm