General

  • Target

    02a611e630cef5d258e43a8330ca6507

  • Size

    157KB

  • MD5

    02a611e630cef5d258e43a8330ca6507

  • SHA1

    7dc2e9a1119860588190d1f0e2985b6975561720

  • SHA256

    ba50ba8bbb8e293208d38f578d34d432186eb06af5dcdda21eb8ac30bacb64be

  • SHA512

    47c492bbb1a31f8aaf8fb1f3a078d261b08627b5e7339bbd651292fb0c043bb45b4a334ef9b7d12965440484ecd72d93581fd6486e7ccc5b1e1599138e66c6cc

  • SSDEEP

    3072:T7k4oECdEV8xkQZxhVx1T7cCDfM4m1QVd51GHvCY:T+FdE+9xLrTTf1m1QVd51GHvCY

Score
10/10

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Mirai family
  • Mirai_x86corona family

Files

  • 02a611e630cef5d258e43a8330ca6507
    .elf linux x86