Sample details: 62c041828b1e6912dfb03298ba438a4d --

Hashes
MD5: 62c041828b1e6912dfb03298ba438a4d
SHA1: 912904d66336aa475ad74ddbf95b4a12db0035df
SHA256: 3fe1b6db980b2c83f78e341fc10669ad4aaf0f1a4978dd15271ef8be016bfc50
SSDEEP: 1536:edj05uR6aBAMCO25cpxIb2MZ9K6WtdGLZQJeLFRcT:d5O6aBA9yPMZ9K6WvGlQJeJK
Details
File Type: ELF
Yara Hits
YRP/maldoc_getEIP_method_1 | YRP/contentis_base64 | YRP/domain | FlorianRoth/Mirai_Botnet_Malware |
Strings
		PTRhvJ
L$d9L$p
D$p9D$,
D$(j@j
D$$j@j
D$(_]j
;|$(t:WWj
D$ j@j
\$H9\$
D$ j@j
< t <	t
C)QQWP
D$ JR**
f;D$Pu
;T$(}Q
D$$PSV
xAPPSh
\$Th h
\$0PPj
}/C;T$
t$$hPh
u%WWSS
t@;D$xu
POST /cdn-cgi/
 HTTP/1.1
User-Agent: 
Host: 
Cookie: 
/proc/net/tcp
/dev/watchdog
/dev/misc/watchdog
abcdefghijklmnopqrstuvw012345678
ZOJFKRA
FGDCWNV
HWCLVGAJ
QWRRMPV
RCQQUMPF
QOACFOKL
AJCLEGOG
Q[QVGO
FPGCO@MZ
PGCNVGI
MGNKLWZ
VGNLGV
FCGOML
OGPNKL
MRGPCVMP
CLVQNS
QWRGPTKQMP
KRACO}PV
TGPVGZ
assword
LGZWQKMVQMNWVKMLQ
NKQVGLKLE
uEzAs"
FGNGVGF
CLKOG"
QVCVWQ"
pgrmpv
jvvrdnmmf"
nmnlmevdm"
XMNNCPF"
egvnmacnkr"
QJGNN"
GLC@NG"
Q[QVGO"
@WQ[@MZ
okpck"
CRRNGV
DMWLF"
LAMPPGAV"
@WQ[@MZ
@WQ[@MZ
vqMWPAG
gLEKLG
sWGP["
PGQMNT
LCOGQGPTGP
aMLLGAVKML
CNKTG"
QGVaMMIKG
PGDPGQJ
NMACVKML
AMMIKG
AMLVGLV
NGLEVJ
VPCLQDGP
GLAMFKLE
AJWLIGF"
AMLLGAVKML
QGPTGP
FMQCPPGQV"
QGPTGP
ANMWFDNCPG
LEKLZ"
cAAGRV
CRRNKACVKML
ZJVON	ZON
CRRNKACVKML
cAAGRV
nCLEWCEG
aMLVGLV
CRRNKACVKML
WPNGLAMFGF"
oMXKNNC
uKLFMUQ
cRRNGuG@iKV
aJPMOG
qCDCPK
oMXKNNC
uKLFMUQ
cRRNGuG@iKV
aJPMOG
qCDCPK
oMXKNNC
uKLFMUQ
cRRNGuG@iKV
aJPMOG
qCDCPK
oMXKNNC
uKLFMUQ
cRRNGuG@iKV
aJPMOG
qCDCPK
oMXKNNC
oCAKLVMQJ
cRRNGuG@iKV
tGPQKML
qCDCPK
/dev/null
.shstrtab
.rodata
.ctors
.dtors