General

  • Target

    30cfae8c68f47578733b626308ffa20545a296a24d2cb2e323e12676cd90e0ae

  • Size

    68KB

  • MD5

    84a1c80a6acf9bcd1133f6241c1f063e

  • SHA1

    b279540b7b6e7987a70cbfed629bcb375c342df3

  • SHA256

    30cfae8c68f47578733b626308ffa20545a296a24d2cb2e323e12676cd90e0ae

  • SHA512

    1258089147b61a16550c8fa8e6274a5c1b64d7b49d6eeaed17847c482a685871f699b0c6f49b748a24dfed0c5078456500b8548e3c61fd5a862b851345d073f3

  • SSDEEP

    1536:V3apaFFcygGLZP+Qjf/KtwXqCeIoxohRCQiSRNkcg0bvmd+lVOCjUxlZS1:V3ya0ylLZGQj6OhGCRHTjBvbvmMlVOCx

Score
10/10

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Mirai family
  • Mirai_x86corona family

Files

  • 30cfae8c68f47578733b626308ffa20545a296a24d2cb2e323e12676cd90e0ae
    .elf linux x86