General

  • Target

    x-3.2-.Sakura

  • Size

    83KB

  • MD5

    79fa8fb7b375d376176013756c046b26

  • SHA1

    11dd226217f35a3449a6a95b178667d9d2f39f4a

  • SHA256

    b02593e16bf36c34510caf14f5626e2d23111e5c81a15a6d7df462c94fae09fc

  • SHA512

    09e87ae43f2534333620efc5cfc8452f3f061ed480f47fd38a3871422b94d61f2c7543ce99b57e24e0f96421ec9e58e2f173284508606193b3cf3688c6be2825

  • SSDEEP

    1536:W35b9Vc4N3J6lreu5r4hWj8L7WDloRmF+wVOz+sXcfW7k:Ab9Vc4JJ6liuq0Y32oRmEwVOz+ucfW7k

Score
10/10

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Mirai family
  • Mirai_x86corona family

Files

  • x-3.2-.Sakura
    .elf linux x86