Resubmissions

18/02/2024, 04:45

240218-fdmmnsee24 10

18/02/2024, 04:45

240218-fdcsgaee22 10

17/02/2024, 20:51

240217-zm5pdsag6v 10

General

  • Target

    nullnet_load.x86.elf

  • Size

    68KB

  • MD5

    1d9768de015834a78ba323e0e6c3ded1

  • SHA1

    6fd29166bfb61609f3a91fe7694516f38410f39e

  • SHA256

    d415cbae8e6ba03fd6ab3a91647f2df06123f5568429a936f4bd36f9a837e8ed

  • SHA512

    919fb333666c39a6820583d410f7f1dc8d4ab25586f1a17304b807d7b4931bf9fd46fdb07c19c4eacae258bc2625d454eb42e202ffa966f8237db2fa7f200dcd

  • SSDEEP

    1536:dt/lTQT7GPYmueXqVXJmB72MFnKiaILO2418HR0jWzvOijgVzOun/a0t:n/lkT7W+6wXJmt2MFnKWL/4CHRjQv/

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

ECCHI

C2

root.pizda.site

Signatures

  • Mirai family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Files

  • nullnet_load.x86.elf
    .elf linux x86