General

  • Target

    354cd2749ad5da34c6f47e1f4967e198660fd754fd8170d9546e8f1407f95201

  • Size

    75KB

  • MD5

    7285e351908509c9d6dd97f9860485e0

  • SHA1

    000af7cd22398a500e5d168dd5c7afe8a833cfaa

  • SHA256

    354cd2749ad5da34c6f47e1f4967e198660fd754fd8170d9546e8f1407f95201

  • SHA512

    9d8af2d053ea9a34ff94c7af57089af21e0bdbcd7c24f3f347c2198fc03c14d1ef21670120ffc1470cd0b98908f683687492b5993ab7ed546ebb7787b0800527

  • SSDEEP

    1536:oHpY6PTVDPZYVjXW71xwU4d0/PZWd+mDFb9c9u34j9aBRm0+lhACbmZfupw:oHbTVDPZYVjXW7nr4d0/ksmDFueX7mbE

Score
10/10

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Mirai family
  • Mirai_x86corona family

Files

  • 354cd2749ad5da34c6f47e1f4967e198660fd754fd8170d9546e8f1407f95201
    .elf linux x86