Behavioral task
behavioral1
Sample
c33164e332f557275b7675c881a46ea32e596a7187644e4b60abdf0243443467.elf
0 signatures
150 seconds
General
-
Target
c33164e332f557275b7675c881a46ea32e596a7187644e4b60abdf0243443467.elf
-
Size
196KB
-
MD5
ba0b7689ce2cf8ea47b808a24efbe808
-
SHA1
0b9a054fcc51d2fd39521204009c41dfce9f50f4
-
SHA256
c33164e332f557275b7675c881a46ea32e596a7187644e4b60abdf0243443467
-
SHA512
2bd78cb1ca098fef52a61f279a01467d3be1dcbf1ee48a2b4894f3882f4b51773f609308f90e00fdfb7878c75e88d3afc921d794a54547152ea7a9d9bc8678d3
-
SSDEEP
6144:HdUruCOlHHDae8VVwQOFoKyl34sTM/RKONhf:HdUrQHHDae8VVwQ8hsI/1f
Score
10/10
Malware Config
Extracted
Family
mirai
C2
botnet.4gnekoland.top
Signatures
-
Mirai family
Files
-
c33164e332f557275b7675c881a46ea32e596a7187644e4b60abdf0243443467.elf.elf linux arm