General

  • Target

    a4e8638a04f35cfc837b4c6397ab1295ceba4f51f3d8cdb607d9602997299de2

  • Size

    72KB

  • MD5

    611427e7a31f6044eb284638dbdfd86a

  • SHA1

    4a4f92c24976dfd94abb03432f66c05d3713eae1

  • SHA256

    a4e8638a04f35cfc837b4c6397ab1295ceba4f51f3d8cdb607d9602997299de2

  • SHA512

    2d84e54732918d80e724b0b62664eb1298ad5ea56c0f2cfb0b3f753c3ffe4eaff5d8375b1d6add334cc3e38fec81fa56f82ed08b4420f22197c8d4946662a5e8

  • SSDEEP

    1536:402ltlMPY/VjoWPTukFxKnDUM234KYG7FJKWiaclH0g3id92DnmP+lVrCjmxfZp1:qltlMPY/VjoWPTDxKnDw34xg7PcJ0goe

Score
10/10

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Mirai family
  • Mirai_x86corona family

Files

  • a4e8638a04f35cfc837b4c6397ab1295ceba4f51f3d8cdb607d9602997299de2
    .elf linux x86