General

  • Target

    2f6a23b17cb09481924fc6603b634d72a25b6b79d1d508735f9c2a12e5df46d3

  • Size

    72KB

  • MD5

    53564664ae55f29371efbedb67f45dc0

  • SHA1

    a3aec2ae83631a0c326c641bfa4cbffa4cea6eab

  • SHA256

    2f6a23b17cb09481924fc6603b634d72a25b6b79d1d508735f9c2a12e5df46d3

  • SHA512

    417b5b7f139de490aa3be1ad7e735f73e7be1865a48f0e54fab7ab3ab05b4574965e8b0fed71808d6beb5d7732ccd493c89c259bab4197d3afbb2a142b03ac55

  • SSDEEP

    1536:qpTcVGPwnVjAWnpvdTk4S3um7qasEGWqejXEKEGz2ctxomP+lVrCjmxfZp1:8cVGPwnVjAWnpFvS3um7hPzjE9+omWlJ

Score
10/10

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Mirai family
  • Mirai_x86corona family

Files

  • 2f6a23b17cb09481924fc6603b634d72a25b6b79d1d508735f9c2a12e5df46d3
    .elf linux x86