General

  • Target

    nullnet_load.x86.elf

  • Size

    72KB

  • MD5

    cd0639b53ae5e0abc11d4fb9e5cb47d6

  • SHA1

    7f42f04ac73f3feec89fc302e97e532f7b818bc9

  • SHA256

    b54cfe57b6970686b781020486c03656ee9c4ac94bbf9d79f5b1fb630f3cf17d

  • SHA512

    e70997914ce78cc6f190716a2282d067f9242eaaca7da1453ab55b1c6cdfee6e05520afa3c383a5ff02bbff669208cef1bd0ad64758b737713f48a8fb5a07291

  • SSDEEP

    1536:oJCMny54LiYugKbKz78/2nW6r/G81XJ0M77f18HbdNW9lQZGxbzEdFyb/4mQtum:oBnyqLiljiw/2nDr+81XJ027fCHbWcej

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

ECCHI

C2

cnc.mamma.su

Signatures

  • Mirai family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Files

  • nullnet_load.x86.elf
    .elf linux x86