General

  • Target

    3a78bb0c65890c71cbde0233dfd0e17b2cb5744311374ac220f2a300deeb32e9

  • Size

    72KB

  • MD5

    f4ec3ea6458aacfcef792c4f39fc4f64

  • SHA1

    6d2175381cf15da46586a44533830179cc0bc918

  • SHA256

    3a78bb0c65890c71cbde0233dfd0e17b2cb5744311374ac220f2a300deeb32e9

  • SHA512

    4c25a4e23e491121d035ae0a3bdbe8450861213b12b8860a9359553cb0dc17d43f366a0ff70155c3318f16199eb7db70f64f1a4ebee53c538cfbbe55a69a949d

  • SSDEEP

    1536:rCTcfGPwnVjAWngclzLk4S3um7qasEGWqejFEKEGz2ctxomP+lVrCjmxfZp1:CcfGPwnVjAWngcFHS3um7hPzBE9+omW7

Score
10/10

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Mirai family
  • Mirai_x86corona family

Files

  • 3a78bb0c65890c71cbde0233dfd0e17b2cb5744311374ac220f2a300deeb32e9
    .elf linux x86