General

  • Target

    nullnet_load.arm.elf

  • Size

    81KB

  • MD5

    3427eb0374873f1695dd9feb0e5db1ea

  • SHA1

    0165c5435b93c90206095e3eb5c28a8cdff0303c

  • SHA256

    7ed7cbf064b2d49295a28931f8a95258acad0596ef5dea61713e58abafee2a8e

  • SHA512

    af210294609a23c28ed667c184cc2ed2e65c0302319f8f9da891a36143018ef94b02da1909e8e5631edab4832c2eec568665231db3483145c7c430f07471c1e4

  • SSDEEP

    1536:nPD2dG+bsLPfn2hpej3lzVM9D52c0wIXhkB8t46/foOy3JWpY:PD2dTXeTQJIRE84wfo53JW

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

ECCHI

Signatures

  • Mirai family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Files

  • nullnet_load.arm.elf
    .elf linux arm