Behavioral task
behavioral1
Sample
def9f8402d30948ad3c93660f91b7d4461eb6486b7f14e46b8088181954207e1.elf
Resource
debian9-armhf-20240611-en
debian-9-armhf
0 signatures
150 seconds
General
-
Target
JaffaCakes118_a29c9e2275c7f950d1e6e215359c4213e7b34c36353f06502c4e935745184648
-
Size
21KB
-
MD5
1d5a286702ea49e1b749c4d7a7f5f339
-
SHA1
0fab99bc7acb63933b375fc060780cd621592b47
-
SHA256
a29c9e2275c7f950d1e6e215359c4213e7b34c36353f06502c4e935745184648
-
SHA512
72a0fcbd607a7a68ff72091ce71291c1bd472da3ec106e1275cee75d60b4f07016cd57ff2ebe2c3c74c2ba589e9b69374b8633c7bce36f269f0b1f95d377c5d5
-
SSDEEP
384:C8hnhJ0vKigWpvthAovxZtOOWud2MzN8fp0Px3YlS+Hxlf7S/pukVeFt:dhnMvKopVZZ1Wu4Mzmfp05Y0+Hxl1kVI
Malware Config
Extracted
Family
mirai
Botnet
MIRAI
C2
demon.u-suck-my-dick.xyz
botnet.goelites.cc
Signatures
-
Mirai family
Files
-
JaffaCakes118_a29c9e2275c7f950d1e6e215359c4213e7b34c36353f06502c4e935745184648.zip
Password: infected
-
def9f8402d30948ad3c93660f91b7d4461eb6486b7f14e46b8088181954207e1.elf.elf linux arm