Sample details: 41796af7cf4980c673485e613fb77215 --

Hashes
MD5: 41796af7cf4980c673485e613fb77215
SHA1: 9a8ee4fe21c3a36c2308dac2fdd05d0a846325ca
SHA256: 07c0c3840df49f63f77413c03d61ebfb98c800ee7296906e68f863f0332856c9
SSDEEP: 1536:kTFXlD1A/zV+J/MVs+qojasifygRKg4F:mFXHqV+J4i6g4g4F
Details
File Type: ELF
Yara Hits
YRP/contentis_base64 | YRP/domain | FlorianRoth/Mirai_Botnet_Malware |
Strings
		/lib/ld-uClibc.so.0
libc.so.0
connect
sigemptyset
memmove
getpid
memcpy
readlink
malloc
__udivsi3
recvfrom
socket
select
readdir
sigaddset
accept
calloc
__umodsi3
inet_addr
setsockopt
signal
unlink
sendto
realloc
listen
__aeabi_ldiv0
__uClibc_main
memset
__div0
__aeabi_uidiv
getppid
opendir
getsockopt
__aeabi_uidivmod
__errno_location
__modsi3
__aeabi_idiv0
strlen
__data_start
setsid
closedir
sigprocmask
getsockname
_edata
__bss_start
__bss_start__
__bss_end__
__end__
POST /cdn-cgi/
 HTTP/1.1
User-Agent: 
Host: 
Cookie: 
/proc/net/tcp
/dev/watchdog
/dev/misc/watchdog
abcdefghijklmnopqrstuvw012345678
TGPVGZ
GRKAPMWVGP
QWRGPTKQMP
OGPNKL
LM@MF[
MRGPCVMP
DMWLFGP
assword
FGDCWNV
CLVQNS
ZOJFKRA
QWRRMPV
RCQQUMPF
HWCLVGAJ
NKQVGLKLE
uEzAs"
FGNGVGF
CLKOG"
QVCVWQ"
pgrmpv
jvvrdnmmf"
nmnlmevdm"
XMNNCPF"
egvnmacnkr"
QJGNN"
GLC@NG"
Q[QVGO"
@WQ[@MZ
okpck"
CRRNGV
DMWLF"
LAMPPGAV"
@WQ[@MZ
@WQ[@MZ
vqMWPAG
gLEKLG
sWGP["
PGQMNT
LCOGQGPTGP
aMLLGAVKML
CNKTG"
cAAGRV
CRRNKACVKML
ZJVON	ZON
CRRNKACVKML
cAAGRV
nCLEWCEG
aMLVGLV
CRRNKACVKML
WPNGLAMFGF"
QGVaMMIKG
PGDPGQJ
NMACVKML
AMMIKG
AMLVGLV
NGLEVJ
VPCLQDGP
GLAMFKLE
AJWLIGF"
AMLLGAVKML
QGPTGP
FMQCPPGQV"
QGPTGP
ANMWFDNCPG
LEKLZ"
oMXKNNC
uKLFMUQ
cRRNGuG@iKV
aJPMOG
qCDCPK
oMXKNNC
uKLFMUQ
cRRNGuG@iKV
aJPMOG
qCDCPK
oMXKNNC
uKLFMUQ
cRRNGuG@iKV
aJPMOG
qCDCPK
oMXKNNC
uKLFMUQ
cRRNGuG@iKV
aJPMOG
qCDCPK
oMXKNNC
oCAKLVMQJ
cRRNGuG@iKV
tGPQKML
qCDCPK
.shstrtab
.interp
.dynsym
.dynstr
.rel.plt
.rodata
.ctors
.dtors
.dynamic