General

  • Target

    ed7ef92da8b19cba00a31e26341139a938b0f46108a9f95e2509449e2fa6c296

  • Size

    71KB

  • MD5

    153fbb17f216858b6de9a751adf0329e

  • SHA1

    6524ed78ad6bf3429601ba5bd8950ffa8dbc0669

  • SHA256

    ed7ef92da8b19cba00a31e26341139a938b0f46108a9f95e2509449e2fa6c296

  • SHA512

    719e1cbfc97cf38551b3cb3f286121231e69f6a5812eb46776f467a3085fa63c3838471a879060162c52b5b4e99c603a64ebc5a193e0108f2ae0d723df16d043

  • SSDEEP

    1536:bqMS9UJjJsFnxq583I4+HCin8tyqH8AKFS3L8bet/IOm3+lVOtjUxfAE1:bqD9UJjJKxqcI9Hv3qH18SAb+/IOmOlt

Score
10/10

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Mirai family
  • Mirai_x86corona family

Files

  • ed7ef92da8b19cba00a31e26341139a938b0f46108a9f95e2509449e2fa6c296
    .elf linux x86