General

  • Target

    b844a8061c8da5d1b55e04d45d7a6958407515918c2a44d33f92a129a1e5b2a5.elf

  • Size

    73KB

  • MD5

    7b1b4d67f7bc764d05e0f1f07f190b96

  • SHA1

    43680cd3089353bf171074ce31245704e266efa1

  • SHA256

    b844a8061c8da5d1b55e04d45d7a6958407515918c2a44d33f92a129a1e5b2a5

  • SHA512

    50251003e19cba9011eadd023ffa5c41aee15cae8c73bca7be317ad90a756ca7acc2063c674b6e0961a474f79da790f8848cec7b425c613a6704118ffdb27c93

  • SSDEEP

    1536:J3EZ61J4N6ly6PI9U2rWZNmc425A5WRbSt7B8t46TfKK9YE:9EZ2J1WgOMbYV84gfJv

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

ECCHI

Signatures

  • Mirai family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Files

  • b844a8061c8da5d1b55e04d45d7a6958407515918c2a44d33f92a129a1e5b2a5.elf
    .elf linux arm