Sample details: 69485cd1d7f33ee63035b5a51322499d --

Hashes
MD5: 69485cd1d7f33ee63035b5a51322499d
SHA1: 314f3deeb9d6356ba993940486909eb1679abf1c
SHA256: ac4b67a62c9620cd00d20f17cbdd7bb6b9a39580d1bb6a77462b9b0a2352d519
SSDEEP: 1536:XIgoJGRMyGgRu2S0wG5frIJBobWeUESckP98:XoJmMyGgRnwkfrInobWetScEe
Details
File Type: ELF
Yara Hits
YRP/maldoc_getEIP_method_1 | YRP/domain | YRP/contentis_base64 | YRP/Mirai_2 | FlorianRoth/Mirai_Botnet_Malware |
Strings
		PTRhvK
L$d9L$p
D$p9D$,
D$(j@j
D$$j@j
D$(_]j
;|$(t:WWj
D$ j@j
\$H9\$
D$ j@j
< t <	t
C)QQWP
D$ JR**
f;D$Pu
;T$(}Q
D$$PSV
xAPPSh`c
\$Th<`
\$0PPj
}/C;T$
t$$hl`
u%WWSS
t@;D$xu
POST /cdn-cgi/
 HTTP/1.1
User-Agent: 
Host: 
Cookie: 
/proc/net/tcp
/dev/watchdog
/dev/misc/watchdog
abcdefghijklmnopqrstuvw012345678
CLVQNS
FGDCWNV
ZOJFKRA
CLVQNS"
RCQQUMPF
QWRGPTKQMP
cFOKLKQVPCVMP
CFOKLKQVPCVMP
QOACFOKL
OGPNKL
QWRRMPV
FCGOML
VGNLGV
MRGPCVMP
assword
KI@GLQWRGPAMMN
NKQVGLKLE
uEzAs"
FGNGVGF
CLKOG"
QVCVWQ"
pgrmpv
jvvrdnmmf"
nmnlmevdm"
XMNNCPF"
egvnmacnkr"
QJGNN"
GLC@NG"
Q[QVGO"
@WQ[@MZ
okpck"
CRRNGV
DMWLF"
LAMPPGAV"
@WQ[@MZ
@WQ[@MZ
vqMWPAG
gLEKLG
sWGP["
PGQMNT
LCOGQGPTGP
aMLLGAVKML
CNKTG"
QGVaMMIKG
PGDPGQJ
NMACVKML
AMMIKG
AMLVGLV
NGLEVJ
VPCLQDGP
GLAMFKLE
AJWLIGF"
AMLLGAVKML
QGPTGP
FMQCPPGQV"
QGPTGP
ANMWFDNCPG
LEKLZ"
cAAGRV
CRRNKACVKML
ZJVON	ZON
CRRNKACVKML
cAAGRV
nCLEWCEG
aMLVGLV
CRRNKACVKML
WPNGLAMFGF"
oMXKNNC
uKLFMUQ
cRRNGuG@iKV
aJPMOG
qCDCPK
oMXKNNC
uKLFMUQ
cRRNGuG@iKV
aJPMOG
qCDCPK
oMXKNNC
uKLFMUQ
cRRNGuG@iKV
aJPMOG
qCDCPK
oMXKNNC
uKLFMUQ
cRRNGuG@iKV
aJPMOG
qCDCPK
oMXKNNC
oCAKLVMQJ
cRRNGuG@iKV
tGPQKML
qCDCPK
/dev/null
.shstrtab
.rodata
.ctors
.dtors