General

  • Target

    NEAS.2f530f5e77488e352d6ecf1e2df9d8e2869c6d0babf18e1485401e744fbcabbbelf_JC.elf

  • Size

    81KB

  • MD5

    b0ae688ae0840dfe1b5eda96686d3c21

  • SHA1

    fa91d5a506c98acd051a22684c5c0806388cc0f8

  • SHA256

    2f530f5e77488e352d6ecf1e2df9d8e2869c6d0babf18e1485401e744fbcabbb

  • SHA512

    7e793d4352ff87a15f3be130e70ef4cb959e1d7ed55798f3e372363ec58c5a2d6ce41166ed734e0f0be995157fcf02463bba3854451bb6fe620b61b8344f70ee

  • SSDEEP

    1536:sZCG1zEFBkqLPvdEpBnjBDNzVa9B52T+93D50B8t46/keXEJ2Bd:ACG0BkBndDwB31084okEEJ2

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

ECCHI

C2

cnc.stress.wtf

scan.stress.wtf

Signatures

  • Mirai family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Files

  • NEAS.2f530f5e77488e352d6ecf1e2df9d8e2869c6d0babf18e1485401e744fbcabbbelf_JC.elf
    .elf linux arm