Sample details: 5da8d78f50a33d6b5c9b96ce309740fb --

Hashes
MD5: 5da8d78f50a33d6b5c9b96ce309740fb
SHA1: 6f4ff36038e178b6decb28598d9f8c1e84786f05
SHA256: b8998e531fb4de934fa172e064152ae3ef37937eb443351a9c373a9cdf2f90da
SSDEEP: 1536:Iycq9G7O9vwitb/XZz+aXtEgTTr0USW7V/DjObeFt6PuQ41:Iq9G7O1witb/XZz+aXqCrBSWZ/XObebZ
Details
File Type: ELF
Added: 2019-10-09 12:42:42
Yara Hits
YRP/maldoc_getEIP_method_1 | YRP/domain | YRP/IP | YRP/contentis_base64 | FlorianRoth/Mirai_Botnet_Malware |
Source
http://50.115.168.100/lmaoWTF/loligang.x86
Strings
		L$d9L$p
D$p9D$,
D$$j@j
;|$(t:PPj
;|$(t:PPj
D$,Pj6
;T$(}Q
D$$PSV
xAPPSh
\$0PPj
}/C;T$
u%WWSS
t@;D$xu
POST /cdn-cgi/
 HTTP/1.1
User-Agent: 
Host: 
Cookie: 
/proc/net/tcp
50.115.168.100
,9<0=$7
,7gaee
?8"efg
efg`ab
<=gael
75 edfm
5::=1fdef
5::=1fdeg
5::=1fde`
5::=1fdea
5::=1fdeb
?;d"=.,"
?;d509=:
758"=:
2=018efg
0125!8 
'!$$;& 
1$=7&;! 1&
9; ;&;85
91&8=:
93gadd
FGNGVGF
CLKOG"
QVCVWQ"
FTPjGNRGP"
lKeeGp
qMPCnmcfgp"
lKeeGpF
kW{EWHGkSL"
PMWVG"
ARWKLDM"
`memokrq"
NMACN"
UCVAJFME"
UCVAJFME"
}UCVAJFME"
LGVQNKLI
rpktoqe"
egvnmacnkr"
iknncvvi"
eJMQVuWXjGPG
QJGNN"
GLC@NG"
Q[QVGO"
@WQ[@MZ
CRRNGV
DMWLF"
LAMPPGAV"
@WQ[@MZ
@WQ[@MZ
vqMWPAG
gLEKLG
sWGP["
PGQMNT
LCOGQGPTGP
aMLLGAVKML
CNKTG"
QGVaMMIKG
PGDPGQJ
NMACVKML
AMMIKG
AMLVGLV
NGLEVJ
VPCLQDGP
GLAMFKLE
AJWLIGF"
AMLLGAVKML
QGPTGP
FMQCPPGQV"
QGPTGP
ANMWFDNCPG
LEKLZ"
CQQUMPF"
GLVGP"
FICMUHDKPJKCF
GFHICK"
cAAGRV
CRRNKACVKML
ZJVON	ZON
CRRNKACVKML
cAAGRV
nCLEWCEG
aMLVGLV
CRRNKACVKML
WPNGLAMFGF"
oMXKNNC
uKLFMUQ
cRRNGuG@iKV
aJPMOG
qCDCPK
oMXKNNC
uKLFMUQ
cRRNGuG@iKV
aJPMOG
qCDCPK
oMXKNNC
uKLFMUQ
cRRNGuG@iKV
aJPMOG
qCDCPK
oMXKNNC
uKLFMUQ
cRRNGuG@iKV
aJPMOG
qCDCPK
oMXKNNC
oCAKLVMQJ
cRRNGuG@iKV
tGPQKML
qCDCPK
oMXKNNC
AMORCVK@NG
uKLFMUQ
vPKFGLV
oMXKNNC
AMORCVK@NG
uKLFMUQ
vPKFGLV
kLDMrCVJ
oMXKNNC
AMORCVK@NG
uKLFMUQ
vPKFGLV
oqkgaPCUNGP
aGLVGP
oMXKNNC
AMORCVK@NG
uKLFMUQ
vPKFGLV
kLDMrCVJ
oMXKNNC
AMORCVK@NG
uKLFMUQ
vPKFGLV
dWLuG@rPMFWAVQ
oMXKNNC
oCAKLVMQJ
dKPGDMZ
oMXKNNC
oCAKLVMQJ
dKPGDMZ
oMXKNNC
oCAKLVMQJ
dKPGDMZ
oMXKNNC
oCAKLVMQJ
dKPGDMZ
oMXKNNC
uKLFMUQ
cRRNGuG@iKV
aJPMOG
/dev/null
.shstrtab
.rodata
.ctors
.dtors