General

  • Target

    2e01b3100018cec45f4cda7085b57f286fe958f93402dc5a35e4b5c2c791bf59

  • Size

    66KB

  • MD5

    83c30d0848f568c82807eda88f68e2b4

  • SHA1

    d6b9ee5fce3cfbab11c7e0100bafac5866d809c0

  • SHA256

    2e01b3100018cec45f4cda7085b57f286fe958f93402dc5a35e4b5c2c791bf59

  • SHA512

    3a6fb9a1b81b32d2cd7e794372c03a118bfc6446d23bbeb05247d6ad28a3f4f574bb8cc936037e94c8d6f9b9104e974a87700d6ff4facd4986de6aafef27bcbf

  • SSDEEP

    1536:RRVYPCNH1jUdOn4JymPWBSgSh1MtNfr/NbHBDSDmd+l2OZ/fufYEZ:RRUCNH1gdikrEHM1IFrVbJSDmMl2OZXa

Score
10/10

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Mirai family
  • Mirai_x86corona family

Files

  • 2e01b3100018cec45f4cda7085b57f286fe958f93402dc5a35e4b5c2c791bf59
    .elf linux x86