General

  • Target

    eec489d4958250a151a60838fa134e866b1d9c13260ea3cf6577a6c1b1235bf2

  • Size

    78KB

  • MD5

    45fa2daa6cfdcfaf8678277ff7f1494e

  • SHA1

    c374f49e01b72dfa41465132c62ec0735b778eb2

  • SHA256

    eec489d4958250a151a60838fa134e866b1d9c13260ea3cf6577a6c1b1235bf2

  • SHA512

    b5f3b47607228f2c2a1744b14001ebff4c18ec269ff6e2405fd0034220ec369162958d2641320b8ca4879c97101cc998389aa41e700399384751a94ed89f74c7

  • SSDEEP

    1536:qoJk9t5sPrPVj6WH0NnpV0ksvKwwOEReg4BsKhWH88l66666flm8E1V8zlimP+lJ:Ot5sPrPVj6WH0NpqvzwOEReh0cFlI7m2

Score
10/10

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Mirai family
  • Mirai_x86corona family

Files

  • eec489d4958250a151a60838fa134e866b1d9c13260ea3cf6577a6c1b1235bf2
    .elf linux x86