Background
On Mon, Aug 29, 2016 at 5:07 PM I received this ELF malware sample from a person (thank you!). There wasn’t any detail or comment what so ever just one cute little ARM ELF stripped binary file with following data:
arm_lsb: ELF 32-bit LSB executable, ARM, EABI5 version 1 (SYSV), statically linked, stripped
hash: a220940db4be6878e47b74403a8079a1
This is a cleanly GCC: (GNU) 5.3.x
Print
Share
Comment
Cite
Upload
Translate
APA
() » MMD-0057-2016 – Linux/LuaBot – IoT botnet as service. Retrieved from https://www.truth.cx/2016/09/05/mmd-0057-2016-linux-luabot-iot-botnet-as-service/.
MLA" » MMD-0057-2016 – Linux/LuaBot – IoT botnet as service." - , https://www.truth.cx/2016/09/05/mmd-0057-2016-linux-luabot-iot-botnet-as-service/
HARVARD » MMD-0057-2016 – Linux/LuaBot – IoT botnet as service., viewed ,
VANCOUVER - » MMD-0057-2016 – Linux/LuaBot – IoT botnet as service. [Internet]. [Accessed ]. Available from: https://www.truth.cx/2016/09/05/mmd-0057-2016-linux-luabot-iot-botnet-as-service/
CHICAGO" » MMD-0057-2016 – Linux/LuaBot – IoT botnet as service." - Accessed . https://www.truth.cx/2016/09/05/mmd-0057-2016-linux-luabot-iot-botnet-as-service/
IEEE" » MMD-0057-2016 – Linux/LuaBot – IoT botnet as service." [Online]. Available: https://www.truth.cx/2016/09/05/mmd-0057-2016-linux-luabot-iot-botnet-as-service/. [Accessed: ]