General

  • Target

    29f055945dcdac6e0dc6e9828c047747ed3727ed3959cb787239d71a5dee139a

  • Size

    97KB

  • MD5

    630fd35f6cd17c3da2addff5c42f6edc

  • SHA1

    ed19431c9aeffc008b7ca1094fc79bd567b426ee

  • SHA256

    29f055945dcdac6e0dc6e9828c047747ed3727ed3959cb787239d71a5dee139a

  • SHA512

    4a99b99cdc72f34c70b3bb2c50248aedc3c08f4a12aaeda651282fdc8f656e785f0ba5bcccd12aa3de6c8506cb173858293c4e698cab5a11d03320bb8757157b

  • SSDEEP

    3072:WGjnuIGjk4nIhbRdhJpW2rqpadaHeWGJQNjjywBKr20:FnuIGjk4Iv+sdaHeWWQNjjywBKr20

Score
10/10

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Mirai family
  • Mirai_x86corona family

Files

  • 29f055945dcdac6e0dc6e9828c047747ed3727ed3959cb787239d71a5dee139a
    .elf linux x86