General

  • Target

    281e7c803cd2dbec88dc4280d0b70a35b899901b6256b21e567d3cff927ee0d0

  • Size

    113KB

  • MD5

    de8313590dd475c3464893fe2596b94c

  • SHA1

    855007eace12a4994445d1c560bd728ce1bb3bee

  • SHA256

    281e7c803cd2dbec88dc4280d0b70a35b899901b6256b21e567d3cff927ee0d0

  • SHA512

    84823c58e2b773d205794ad43c217fd27b0188ccb788148aeb45f51f844ade4546553ba22937ab7d9fa696c773a875976b907feaae6f44c73228b78bfa9ce366

  • SSDEEP

    3072:UffNNkge6Cr6xQBsmjuxgl54s28lwmvPlnQt+Z0Ua3hgp6W:Dd6Cr6cWW6s2+wmvPat+Z0Ua3hgp6W

Score
10/10

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Mirai family
  • Mirai_x86corona family

Files

  • 281e7c803cd2dbec88dc4280d0b70a35b899901b6256b21e567d3cff927ee0d0
    .elf linux x86