General

  • Target

    0012f3033220902f3f721dc168ffc65f

  • Size

    41KB

  • MD5

    0012f3033220902f3f721dc168ffc65f

  • SHA1

    ab6694377c5a802a2d3c5b7b0fc2ec62273bb442

  • SHA256

    3120ed50f0e924f998f0781248e00cb5c27c4ad809b7d344e782eaaab0da53c3

  • SHA512

    9131a8b463a45d490f599adcb80414384bab96c0a118e0e6a00db9b482f6124fbe53a71cbdd557b207aafcb7cc8cf2f1b22639c9dbda372e0ead467cecd48586

  • SSDEEP

    768:JcHCvheg99DnS3BjzjiIp6kAKgcKoLIC878SzYIJ:JcH0eg99DSRJpgKgcTLIp8SzY

Score
10/10

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Mirai family
  • Mirai_x86corona family

Files

  • 0012f3033220902f3f721dc168ffc65f
    .elf linux x86