General

  • Target

    nullnet_load.arm7.elf

  • Size

    149KB

  • MD5

    7a892360e8ffdcbbd908d586998d10f8

  • SHA1

    c8789a9a3397bcb7eefb349c6851f8316a270187

  • SHA256

    8b7f280f8836558381c518487a8881b0a67b87b41e812cef34bb49790559cceb

  • SHA512

    513429c882c041722d0a83a3d9bac84b68541be27a664d5c7575f64b183b9ab754d8e585db7ef2a48eff0eb5a41b8e7395135bdb78e56fccbf6a497d0cdb32c7

  • SSDEEP

    3072:hb8xFqv7UshHGP0Yq96pjXUASP/tYkIymaGYpM/9em/N6l:5AqvXhHGweXUASP/ekQaGuM/9r6l

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

ECCHI

C2

root.pizda.site

Signatures

  • Mirai family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Files

  • nullnet_load.arm7.elf
    .elf linux arm