General

  • Target

    397d304ed735e66b9a512f0b13715bdcd6496860986335e26a04cd1a34adbd02

  • Size

    119KB

  • MD5

    eb47b62c945724db788834f1313ef5a7

  • SHA1

    1faa8f41ceb10a5677a2c1990fe719f35fdaf91b

  • SHA256

    397d304ed735e66b9a512f0b13715bdcd6496860986335e26a04cd1a34adbd02

  • SHA512

    6b8514d69d34a2876f785539e1c17a1a894b064b4f45029f8fe36feeade74a1d1a979a0176e1e99e62f0a5d124f525121ab3f4501578e8f5a71635eb3c0ea5bb

  • SSDEEP

    3072:02k6IDASHma9WXtARMHddhQ2XxnGtr7K1GiGJcN0P:TUASHmTqWHddpFGtr7K1GhJcN0P

Score
10/10

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Mirai family
  • Mirai_x86corona family

Files

  • 397d304ed735e66b9a512f0b13715bdcd6496860986335e26a04cd1a34adbd02
    .elf linux x86