General

  • Target

    8e4f859ca591365204734b6b22fe9b16d047392aa3d5b746cd11ab8584cb4ed0

  • Size

    85KB

  • MD5

    2401a36c6f2b65031d6658480ef2af33

  • SHA1

    0084b1cb1c0078a5f8c87fd34964bd161a33dbf0

  • SHA256

    8e4f859ca591365204734b6b22fe9b16d047392aa3d5b746cd11ab8584cb4ed0

  • SHA512

    81b9ed0988f939e47a7c64b91073abc7adf4277a4d0104b954f0d77b93c8c410f336f87c61c63faee014d67e07e95ad41c758c76c7f0a5f7349c207c8a486b9f

  • SSDEEP

    1536:k6dopMhn5SvciBCBqunTK5e4Gc1kNCvAL7mTTg:k62KhwUZguTKQRc17XTg

Score
10/10

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Mirai family
  • Mirai_x86corona family

Files

  • 8e4f859ca591365204734b6b22fe9b16d047392aa3d5b746cd11ab8584cb4ed0
    .elf linux x86