General

  • Target

    2a0d9783bf40f0b2a50a51f7413ef8665d2b484a37533713b347fb9273a994a0

  • Size

    70KB

  • MD5

    655931846ddcd68fa40d4eb4c0fa617b

  • SHA1

    4f223bbc959e10ae0776a1f2e70e7bcdbc1caaef

  • SHA256

    2a0d9783bf40f0b2a50a51f7413ef8665d2b484a37533713b347fb9273a994a0

  • SHA512

    04b5cb603ff13ce6d9ddae6113b259c2627f6f6dd4efa0b845d1c6ceb2587acb9cb9780ea741cf93e30010d2cd01200b2d5c72f61b7f43decfd11cc888d127cd

  • SSDEEP

    1536:T7Y0MD/NQ27qLfEg8ZW087BZPmF+lVOCjUxfg71:w0MD/C2GLfcsbdZPmElVOCAxfg71

Score
10/10

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Mirai family
  • Mirai_x86corona family

Files

  • 2a0d9783bf40f0b2a50a51f7413ef8665d2b484a37533713b347fb9273a994a0
    .elf linux x86