General

  • Target

    2911e980cde2a0c1a659e38a7dcff8803c14805a84555781009c8f67539e1449

  • Size

    113KB

  • MD5

    29fd24ff30d43ce08d75db0266d44d0e

  • SHA1

    9d0201d6f0eac5be09d155ce68d2193cb5fddb92

  • SHA256

    2911e980cde2a0c1a659e38a7dcff8803c14805a84555781009c8f67539e1449

  • SHA512

    9d496294a374b16b5aa7b43c6b963495cba4649c09770ad89583c52c031c2af785c9d8f96ec50dae780c0dd2be428c3fa88c84bb07520f08e189ac9a1bbeb2db

  • SSDEEP

    3072:hFYtGmd7Yme1miiBPjiVOPfrwCt+Z0Ua3hgr6W:Fmd7YRiteOPTwCt+Z0Ua3hgr6W

Score
10/10

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Mirai family
  • Mirai_x86corona family

Files

  • 2911e980cde2a0c1a659e38a7dcff8803c14805a84555781009c8f67539e1449
    .elf linux x86