Behavioral task
behavioral1
Sample
e1e9e081c9e730efa06ba1ae1c93a8960f6f7730f902ac824c2835dec901964c.elf
Resource
debian12-armhf-20240221-en
debian-12-armhf
6 signatures
150 seconds
General
-
Target
e1e9e081c9e730efa06ba1ae1c93a8960f6f7730f902ac824c2835dec901964c.zip
-
Size
59KB
-
MD5
ea7680d1bc06127ebb0e7db0eabee069
-
SHA1
70c2c1c9016461ad212cc545d5c694c84ec176f4
-
SHA256
848b24188bb64b490fd0ab150eed506f8cc54055ad8e84d9120927995ac5f282
-
SHA512
a5462d44ad7f6cddc958e27fed2501f5db7134bec5b1556e232daf6f372ee59e31b4fad9f40efd03ac7479910b9bebc2ba116b7a5bf2108148f205eaa9e4b2b1
-
SSDEEP
1536:X7HsxyYXu57z99xEPNu128V5yt5GvN5d2ol7E763ca4pcc:b2Xu5759xwc5yOB2o1k9a46c
Score
10/10
Malware Config
Extracted
Family
mirai
C2
www.india-scam-call-center.pw
Signatures
-
Mirai family
Files
-
e1e9e081c9e730efa06ba1ae1c93a8960f6f7730f902ac824c2835dec901964c.zip.zip
Password: infected
-
e1e9e081c9e730efa06ba1ae1c93a8960f6f7730f902ac824c2835dec901964c.elf.elf linux arm