General

  • Target

    73e70d05a13b3caa3ace7f87e1fe25892b1e3afdfbfc4b72a5bb81f39d4a2fb5

  • Size

    108KB

  • MD5

    49a8920382c02bbc4998b6d01f5161a1

  • SHA1

    5def7ad2f311b5e2214778ee8acd33bbb07473d8

  • SHA256

    73e70d05a13b3caa3ace7f87e1fe25892b1e3afdfbfc4b72a5bb81f39d4a2fb5

  • SHA512

    7f9bbe1537e7db4357a95590d438e10225956ae30aba00d811abb5d3add3f4b1544caff6bd7696a0f2d2861e7e4bdbafa9995c6f235901b27a47bd1b57cabd13

  • SSDEEP

    3072:jeVCaxFQ+X6CAKgdVvlomCVqtFvDYHjmoTadvfn:SV7X3onmVqtFvDYHjmoTadvfn

Score
10/10

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Mirai family
  • Mirai_x86corona family

Files

  • 73e70d05a13b3caa3ace7f87e1fe25892b1e3afdfbfc4b72a5bb81f39d4a2fb5
    .elf linux x86