General

  • Target

    NEAS.f9c355ee6b3baa1fa4bc15f89ba23bd8d5fd84bdee5cbf063c4c0eb78fd5dfc5elf_JC.elf

  • Size

    73KB

  • MD5

    0177eca7f1875403bab58ac21d4e0273

  • SHA1

    696221ee67ecbb97981771f691badc601f4e8d12

  • SHA256

    f9c355ee6b3baa1fa4bc15f89ba23bd8d5fd84bdee5cbf063c4c0eb78fd5dfc5

  • SHA512

    c6018f972c6e6860cb24d27154377dbe6a1144c9ac29cc375c4a3e2697229f7cefa03deb86c7a2ad1747882a8cd06bc17b7334edc6e43aecbd6fef8dcfc3e418

  • SSDEEP

    1536:mAuFbM7Sfgy6BKDsVdWRNmkiQ5YeM0rPay7B8t461r4g4/Ted0:YF8Sfwh6Oc7PV84GriTz

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

ECCHI

C2

cnc.stress.wtf

scan.stress.wtf

Signatures

  • Mirai family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Files

  • NEAS.f9c355ee6b3baa1fa4bc15f89ba23bd8d5fd84bdee5cbf063c4c0eb78fd5dfc5elf_JC.elf
    .elf linux arm