General

  • Target

    32cab7b13af8ac40d2c0ec217e0163d0b69ed175928698a78e4e4c5f537e7aab

  • Size

    70KB

  • MD5

    80438077bc77c4cd6744e4fb7c3d40a0

  • SHA1

    4009c8d4bdf7f4669b422475eb88b7a1cdb8f15e

  • SHA256

    32cab7b13af8ac40d2c0ec217e0163d0b69ed175928698a78e4e4c5f537e7aab

  • SHA512

    9cab988dc5cfbacdbbd62684ae07459d0e46b17c3454b8b4de5bec3629ba4464c53576598bd0cfa65c38578844ccabb775de7333c0d86de7ef8410a5561f2984

  • SSDEEP

    1536:7lgX2wYEIAMceWnzjVWS87yV8mF+lVOCsUxfg71:mXlYEIAMDWvAd+emElVOCVxfg71

Score
10/10

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Mirai family
  • Mirai_x86corona family

Files

  • 32cab7b13af8ac40d2c0ec217e0163d0b69ed175928698a78e4e4c5f537e7aab
    .elf linux x86