General

  • Target

    2a4a12a9e5dcea44ae2b7cdd34e8818aec22d3dd924e9d9e6a4044646307b8f3

  • Size

    101KB

  • MD5

    c845416fd1a21fafcf2df6a90bac4a58

  • SHA1

    3e1161bd57088a5143ab81677cdf64e2f0caf2fb

  • SHA256

    2a4a12a9e5dcea44ae2b7cdd34e8818aec22d3dd924e9d9e6a4044646307b8f3

  • SHA512

    5d0a00c64eb8bce10f69e46dd5db036a47c75c678e46c3a709ad08fb67fc90f09d72e9efca5eb0edc42c5bcd082871c2835d6d2aaa4e34bc7ea5b38cbb85aa83

  • SSDEEP

    3072:xFe53p9WeQhgFHQGRqdHz+trtC9eqRyBsi4+5mZ/W:xFe53pkVmHjEt0r4+5mB

Score
10/10

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Mirai family
  • Mirai is a prevalent Linux malware infecting exposed network devices 1 IoCs

    Detected Mirai Linux malware

  • Mirai_x86corona family

Files

  • 2a4a12a9e5dcea44ae2b7cdd34e8818aec22d3dd924e9d9e6a4044646307b8f3
    .elf linux x86