General

  • Target

    2f63a8a1da2a0522191047f27948330baf8ffb422d7a9c779a1856d28d7349ae

  • Size

    113KB

  • MD5

    9bafc4cf3fdd8336a0c5e0825ed3584e

  • SHA1

    209465a854d36acda1857961bf7095c75e260a42

  • SHA256

    2f63a8a1da2a0522191047f27948330baf8ffb422d7a9c779a1856d28d7349ae

  • SHA512

    f59cafa951b4b63b27d863b512334a9043841b6ff8dc3d590f72d38d245e3c9c5e1eb740f6564a0078acf7538337caf1e0c44989998b42be7a7d3f49b7389759

  • SSDEEP

    3072:Qvzla/zS8QUGzBXaxntk/TBMFpA1t+Z0Ua3hgp6W:f/zS8dgYjGTB+pst+Z0Ua3hgp6W

Score
10/10

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Mirai family
  • Mirai_x86corona family

Files

  • 2f63a8a1da2a0522191047f27948330baf8ffb422d7a9c779a1856d28d7349ae
    .elf linux x86