Warning! We are currently in recovery mode. The complete archive is not available.

Sample details: 4b2620c4d6778087a7ac92aa4cea3026 --

Hashes
MD5: 4b2620c4d6778087a7ac92aa4cea3026
SHA1: 7c11d6a211710797adfc7a2499b054b8d5592e65
SHA256: 32fa9b05d5f26f315135044f854c35ab8a93cac346a94d458b806d47a355bae9
SSDEEP: 1536:WuswlwjmqU6gRh2LnfyFpmWeUESEkP98:WuPlwCqU6gCTfyFpmWetSEEe
Details
File Type: ELF
Yara Hits
YRP/maldoc_getEIP_method_1 | YRP/contentis_base64 | YRP/domain | YRP/IP | FlorianRoth/Mirai_Botnet_Malware |
Strings
		PTRh6K
D$LhmK
L$d9L$p
D$p9D$,
~s[2016-12-18 09:34:22 UTC] [163.172.121.4:40875] AUTH: enable:shell
[2016-12-18 09:34:22 UTC] [163.172.121.4:40875] SUCESS_MIRAI_ENABLE: enable:shell
[2016-12-18 09:34:22 UTC] [163.172.121.4:40875] SESSION_START
[2016-12-18 09:34:22 UTC] [163.172.121.4:40875] CMD: sh
[2016-12-18 09:34:22 UTC] [163.172.121.4:40875] CMD: /bin/busybox ECCHI
D$(j@j
D$$j@j
D$(_]j
;|$(t:WWj
D$ j@j
\$H9\$
D$ j@j
< t <	t
C)QQWP
D$ JR**
[2016-12-18 09:34:23 UTC] [163.172.121.4:40875] CMD: /bin/busybox ps; /bin/busybox ECCHI
f;D$Pu
;T$(}Q
D$$PSV
xAPPSh`c
\$Th<`
\$0PPj
}/C;T$
t$$hl`
u%WWSS
[2016-12-18 09:34:23 UTC] [163.172.121.4:40875] CMD: /bin/busybox cat /proc/mounts; /bin/busybox ECCHI
[2016-12-18 09:34:24 UTC] [163.172.121.4:40875] CMD: /bin/busybox echo -e '\x6b\x61\x6d\x69' > /.nippon; /bin/busybox cat /.nippon; /bin/busybox rm /.nippon
[2016-12-18 09:34:24 UTC] [163.172.121.4:40875] CMD: /bin/busybox echo -e '\x6b\x61\x6d\x69/home/admin' > /home/admin/.nippon; /bin/busybox cat /home/admin/.nippon; /bin/busybox rm /home/admin/.nippon
[2016-12-18 09:34:24 UTC] [163.172.121.4:40875] CMD: /bin/busybox echo -e '\x6b\x61\x6d\x69/dev' > /dev/.nippon; /bin/busybox cat /dev/.nippon; /bin/busybox rm /dev/.nippon
[2016-12-18 09:34:25 UTC] [163.172.121.4:40875] CMD: /bin/busybox ECCHI
[2016-12-18 09:34:25 UTC] [163.172.121.4:40875] CMD: rm /home/admin/.t; rm /home/admin/.sh; rm /home/admin/.human
[2016-12-18 09:34:25 UTC] [163.172.121.4:40875] CMD: cd /home/admin/
[2016-12-18 09:34:25 UTC] [163.172.121.4:40875] CMD: /bin/busybox cp /bin/echo dvrHelper; >dvrHelper; /bin/busybox chmod 777 dvrHelper; /bin/busybox ECCHI
t@;D$xu
POST /cdn-cgi/
 HTTP/1.1
User-Agent: 
Host: 
Cookie: 
/proc/net/tcp
/dev/watchdog
/dev/misc/watchdog
abcdefghijklmnopqrstuvw012345678
ZOJFKRA
FGDCWNV
HWCLVGAJ
QWRRMPV
RCQQUMPF
QOACFOKL
OGKLQO
cFOKLKQVPCVMP
QGPTKAG
QWRGPTKQMP
CFOKLKQVPCVMP
Q[QVGO
FPGCO@MZ
PGCNVGI
CFOKL"
CFOKLbO[OKDK"
xOStDMqkr"
CLVQNS"
FGDCWNV"
CFOKLNTHJ"
CFOKLNTHJCFOKLNTHJ
assword
NKQVGLKLE
uEzAs"
FGNGVGF
CLKOG"
QVCVWQ"
pgrmpv
jvvrdnmmf"
nmnlmevdm"
XMNNCPF"
egvnmacnkr"
QJGNN"
GLC@NG"
Q[QVGO"
@WQ[@MZ
okpck"
CRRNGV
DMWLF"
LAMPPGAV"
@WQ[@MZ
@WQ[@MZ
vqMWPAG
gLEKLG
sWGP["
PGQMNT
LCOGQGPTGP
aMLLGAVKML
CNKTG"
QGVaMMIKG
PGDPGQJ
NMACVKML
AMMIKG
AMLVGLV
NGLEVJ
VPCLQDGP
GLAMFKLE
AJWLIGF"
AMLLGAVKML
QGPTGP
FMQCPPGQV"
QGPTGP
ANMWFDNCPG
LEKLZ"
cAAGRV
CRRNKACVKML
ZJVON	ZON
CRRNKACVKML
cAAGRV
nCLEWCEG
aMLVGLV
CRRNKACVKML
WPNGLAMFGF"
oMXKNNC
uKLFMUQ
cRRNGuG@iKV
aJPMOG
qCDCPK
oMXKNNC
uKLFMUQ
cRRNGuG@iKV
aJPMOG
qCDCPK
oMXKNNC
uKLFMUQ
cRRNGuG@iKV
aJPMOG
qCDCPK
oMXKNNC
uKLFMUQ
cRRNGuG@iKV
aJPMOG
qCDCPK
oMXKNNC
oCAKLVMQJ
cRRNGuG@iKV
tGPQKML
qCDCPK
/dev/null
[2016-12-18 09:34:26 UTC] [163.172.121.4:40875] CMD: /bin/busybox cat /bin/echo
.shstrtab
.rodata
.ctors
.dtors