General

  • Target

    42b289bab7584155c626ba7be194fcf1f64490e8139a8c3db2b5df5f3c811d96

  • Size

    80KB

  • MD5

    e27abfd97f8a0a42c386c2bc6c0829b4

  • SHA1

    66bde01f00f4c5fe5744117560dfcf04a387c63f

  • SHA256

    42b289bab7584155c626ba7be194fcf1f64490e8139a8c3db2b5df5f3c811d96

  • SHA512

    d16cebdf73cd33dafb4a76b8fffe4235a9c9433a4f995da99708a2310045652f88ad7e2ff41979740a33902563041a35270ff33f6549985893a260a7c1394b8f

  • SSDEEP

    1536:Vzzbyokygq/3drCaT5MP6/JWsgfffRiML8yqXZGRZgq02m61+T:1/yJq/3db1My/I73piXpGRZgq02mU+T

Score
10/10

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Mirai family
  • Mirai_x86corona family

Files

  • 42b289bab7584155c626ba7be194fcf1f64490e8139a8c3db2b5df5f3c811d96
    .elf linux x86