General

  • Target

    2a69e920dfa8d9cad2b9baedcd5625162d4231de4c8a0e47948328afd079e31b

  • Size

    70KB

  • MD5

    0fd6ed8a0fe6d5663cf141d95ee3b3d3

  • SHA1

    e7f13c89cdf4f55f0598cb59a10e3d6397315b5d

  • SHA256

    2a69e920dfa8d9cad2b9baedcd5625162d4231de4c8a0e47948328afd079e31b

  • SHA512

    a2eeb951b784d6a9ec26f26c39380b46e1a2679d2efe68b019c6e5415ac62830be753b68aed0618abcf29717631393146fbc2e7dcfda516c57d16783dcb619d6

  • SSDEEP

    1536:mEY0af/NQ27qLfEg8ZW087fZPmF+lVOCjUxfg71:a0af/C2GLfcsbbZPmElVOCAxfg71

Score
10/10

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Mirai family
  • Mirai_x86corona family

Files

  • 2a69e920dfa8d9cad2b9baedcd5625162d4231de4c8a0e47948328afd079e31b
    .elf linux x86