General

  • Target

    NEAS.b86d9bfb9358d2e84dafeae343d9bd52f31d874f2e3072b31fcafa074ef360c3elf_JC.elf

  • Size

    153KB

  • MD5

    95a5abb5de4b07cfff1079c20480d34c

  • SHA1

    52177a0216ee5efb8ebcc500d4634842a3b7f9ba

  • SHA256

    b86d9bfb9358d2e84dafeae343d9bd52f31d874f2e3072b31fcafa074ef360c3

  • SHA512

    776de1a3b634bcb2bafb8e205ede399801d78f4a5bec3f346d5669687d1cf9b1f9aa6d0aa27fc29210b596a81c41b8d77b028e211ccbf97d95507ae5463d486f

  • SSDEEP

    3072:55hwGxF6QKUWXbGOYqpIpzJ8zYSW7cERegNafOJquM/9ITDL8l:jbxFwUWrz+8zYSW7NRefOIuM/9yDL8l

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

ECCHI

C2

cnc.stress.wtf

scan.stress.wtf

Signatures

  • Mirai family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Files

  • NEAS.b86d9bfb9358d2e84dafeae343d9bd52f31d874f2e3072b31fcafa074ef360c3elf_JC.elf
    .elf linux arm