General

  • Target

    30490b13c46c23b68b40a10c5923ddc8e09d6fb3195f8d973955a3f9add31cb5

  • Size

    78KB

  • MD5

    ee5149837a56c4c71bbf4187b606cbaa

  • SHA1

    06132e49c284c39747e1c4039100f7d601400bff

  • SHA256

    30490b13c46c23b68b40a10c5923ddc8e09d6fb3195f8d973955a3f9add31cb5

  • SHA512

    072e7793db1a197e173f8de4d98de891945bd0abc10346d6d68655668a3a414f7df67a71497b3753b7fefe1858546d9e9aa88a29351aac4fddbc46fcb36d44b1

  • SSDEEP

    1536:Aobk9t5sPrPVj6WHC/DpFsksvKwwOEReg4BsKhWH88m66666Plm8E1V8zlimP+lJ:mt5sPrPVj6WHC/FivzwOEReh0cWlI7m2

Score
10/10

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Mirai family
  • Mirai_x86corona family

Files

  • 30490b13c46c23b68b40a10c5923ddc8e09d6fb3195f8d973955a3f9add31cb5
    .elf linux x86