General

  • Target

    39d037cd66980ed44a90d8bb66bb6ce09bbaccac390e915b7598020920cf4592

  • Size

    75KB

  • MD5

    16076d1f84777c7dba10a15ae4cf6dba

  • SHA1

    49a6e02b9663dd6a19a02b5a07716a35b59db362

  • SHA256

    39d037cd66980ed44a90d8bb66bb6ce09bbaccac390e915b7598020920cf4592

  • SHA512

    ba16c2408d56fa88787c0f7fa977c87d678e325cc9bd08a4e7cf1a57cae3fd1e3994bd638c1f49f4b02b1682d65b1d5f89d4a156a977c4a53c7f143693ae188a

  • SSDEEP

    1536:WLcJNK96ljW3oU3OmRzeQvAsZjXcBlUm/oYyke66Gm3XqhRRMFBf4Dc:WLUk96ljW3o7mRqQI6cBmK9j6GmnqhRg

Score
10/10

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Mirai family
  • Mirai_x86corona family

Files

  • 39d037cd66980ed44a90d8bb66bb6ce09bbaccac390e915b7598020920cf4592
    .elf linux x86