General

  • Target

    NEAS.3030e253b00e9fce26f159e654c93c0f7accd2826875caaad8faa1b5ad984277elf_JC.elf

  • Size

    106KB

  • MD5

    0d8e46b5ce0120a4ec8692e956cf39e7

  • SHA1

    cff2f24831c30c566885e8d740e314bde20cfa7c

  • SHA256

    3030e253b00e9fce26f159e654c93c0f7accd2826875caaad8faa1b5ad984277

  • SHA512

    8ed1f9207fd51842aa9e3852865b6207973817c96d26456203291e58f99e3040f2575a9de7e4dddbf03054e0ff4a60e025189e9482ed3f7d5bc22f05be449b7a

  • SSDEEP

    1536:nbRemFZYH7D+jr8Cnmhs5ViW1GNbmEKbSxp8NMzxZKfACZu:nlemFZYH7D+jNnpF1GA0zx

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

ECCHI

C2

cnc.stress.wtf

scan.stress.wtf

Signatures

  • Mirai family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Files

  • NEAS.3030e253b00e9fce26f159e654c93c0f7accd2826875caaad8faa1b5ad984277elf_JC.elf
    .elf linux mipsel