General

  • Target

    7e879dd743a0ae666c2dbd1ae035a04c62ba37bae7dce1109118331601ef7e4a

  • Size

    85KB

  • MD5

    d82fb0c6deed713d7c60704b7122bffb

  • SHA1

    df0ce1a94306ce18bc537c1cd5d40aec4a2b160f

  • SHA256

    7e879dd743a0ae666c2dbd1ae035a04c62ba37bae7dce1109118331601ef7e4a

  • SHA512

    50e11475f162f302cb5d1257d120411c6f314faf969f98e0f52666d50026c8213165a77bbbf16af6d46b12f64c2c1c2209f9755c2c831c7df5dc0861c78cf5ef

  • SSDEEP

    1536:k6do5Mhn5SvciBCECLxyzIOEHk/3xCVpamTTg:k626hwUZfLx0IFE/cRTg

Score
10/10

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Mirai family
  • Mirai_x86corona family

Files

  • 7e879dd743a0ae666c2dbd1ae035a04c62ba37bae7dce1109118331601ef7e4a
    .elf linux x86