General

  • Target

    2ea1319703b5a1dcdea0f8c841b17bcd2edec60b267d098e3f0a7f50055ba98c

  • Size

    70KB

  • MD5

    29100a3c7902eb616827aa160f488f50

  • SHA1

    a3b4a8d794309510a45b95a0e507b11337bd419b

  • SHA256

    2ea1319703b5a1dcdea0f8c841b17bcd2edec60b267d098e3f0a7f50055ba98c

  • SHA512

    72699f844d87b4adf63f0559491337e8ee9dc66d936a023c1592bf67d61721199014b71c9c2b959988756f3b67736cc51dc2c61f434fa6cdfdca7edccd10cc0d

  • SSDEEP

    1536:/taBNxGAEV8+494o9nlmqe8ThfZ9iZOaa1md+lVOCjUxfg71:/tiOA4DeVplLFfzUOaa1mMlVOCAxfg71

Score
10/10

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Mirai family
  • Mirai_x86corona family

Files

  • 2ea1319703b5a1dcdea0f8c841b17bcd2edec60b267d098e3f0a7f50055ba98c
    .elf linux x86