General

  • Target

    e92c6f653871b6bf18592fd1379e1d8466e84301ed433684981ed014ba27a289

  • Size

    75KB

  • MD5

    8f1adfa78804d094c2c1d983a8da33b7

  • SHA1

    b567c2bba76f13c7d64c1bf7c7e13f0c1e7e31a2

  • SHA256

    e92c6f653871b6bf18592fd1379e1d8466e84301ed433684981ed014ba27a289

  • SHA512

    6ee8522e018530083112dce9c3a67833937e7d8dc654ac5fc3fe6f5895589fdef6a044f1251a86058e22c6c8978ffc5e1e623c1432d3febaeccbd77cc22c7705

  • SSDEEP

    1536:D/e9hSvyrxWy0N+/WkngmVu/Nu6LM/LLnAmLItVOCjXZRshS:K9EvyQtiWkngku/DafAmUtVOCbZRshS

Score
10/10

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Mirai family
  • Mirai_x86corona family

Files

  • e92c6f653871b6bf18592fd1379e1d8466e84301ed433684981ed014ba27a289
    .elf linux x86