General

  • Target

    2f6ebd4a7942817d120b00de2e1eabb7f851d6dd47a2b2ce50d51eaae9490fdc

  • Size

    70KB

  • MD5

    7770e0a98b3cbd543df751715e399c1e

  • SHA1

    fe61ff4305fd59558a18f7507cb3f649c9835005

  • SHA256

    2f6ebd4a7942817d120b00de2e1eabb7f851d6dd47a2b2ce50d51eaae9490fdc

  • SHA512

    7aaef3d8bed527d170771427f5b9344a919cfe4e376598e0f456bae390902ae24a4a1932f101dc8e12f617d55cba474ec3f7d60727840ff5b0d7d7292b15fbfa

  • SSDEEP

    1536:+UaBNJG8EV8+494o9nlmqe8ThfZ9iqSggmd+lVOCjUxfg71:+Uiu84DeVplLFfzvSggmMlVOCAxfg71

Score
10/10

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Mirai family
  • Mirai_x86corona family

Files

  • 2f6ebd4a7942817d120b00de2e1eabb7f851d6dd47a2b2ce50d51eaae9490fdc
    .elf linux x86