General

  • Target

    d415cbae8e6ba03fd6ab3a91647f2df06123f5568429a936f4bd36f9a837e8ed.zip

  • Size

    35KB

  • MD5

    a1e9485d17e60afda394fdcfe206b331

  • SHA1

    2835c0845d055546536449ba452e7f6f7e2d1264

  • SHA256

    93ccc8470dcb68e947dc9450edcc1af7a4ec119a43f8bfb0161c92c9cf7b72fe

  • SHA512

    e5d66d82b09d7a4600de82470d724b400bb630243bf5ce0f3af72c32294cafd6b70517408b10257ebf9caf2125e8ebf934f14a2d7948e3d1649096d311cc1027

  • SSDEEP

    768:Gl0JTeJBBBSq9xFy0i9K+OBbReuN7QeT9UVWRiHiulbc1a:G+YBBEixFyh8BdzNUm9UVpCulbh

Score
10/10

Malware Config

Extracted

Family

mirai

Botnet

ECCHI

C2

root.pizda.site

Signatures

  • Mirai family
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Files

  • d415cbae8e6ba03fd6ab3a91647f2df06123f5568429a936f4bd36f9a837e8ed.zip
    .zip

    Password: infected

  • d415cbae8e6ba03fd6ab3a91647f2df06123f5568429a936f4bd36f9a837e8ed.elf
    .elf linux x86