General

  • Target

    2f7fe26303c177f3032c088fc1c3cd1490db5ace097d073b70ed9bce685b47e4

  • Size

    70KB

  • MD5

    6db7dc651e87e7d04833d641de23b9bf

  • SHA1

    58226c7197d6d78ba09e22b0fe661f029e34d46d

  • SHA256

    2f7fe26303c177f3032c088fc1c3cd1490db5ace097d073b70ed9bce685b47e4

  • SHA512

    8925cce16346bc0feffbc193e9d8a432ae6df554a11db518d02283f7c9d76042102ae241886183c39aa226b2684ff9280dfaf6cdc777c4821645e37ccf0826d5

  • SSDEEP

    1536:T7Y0MD/NQ27qLfEg8ZW087GZPmF+lVOCjUxfg71:w0MD/C2GLfcsb6ZPmElVOCAxfg71

Score
10/10

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Mirai family
  • Mirai_x86corona family

Files

  • 2f7fe26303c177f3032c088fc1c3cd1490db5ace097d073b70ed9bce685b47e4
    .elf linux x86