General

  • Target

    e7b9fea4f6738e070b1e7754b8480745917323e560ca6fde1fe93dd3c402ad96

  • Size

    71KB

  • MD5

    fbd65466ddb1283d3bc17432bb78adee

  • SHA1

    86ff30c00c55b3abca951ecc14f0bd08df92122e

  • SHA256

    e7b9fea4f6738e070b1e7754b8480745917323e560ca6fde1fe93dd3c402ad96

  • SHA512

    5e35aa1afcbf286de5d7a5b8d9042acb240d46ec87a0a853362a50fc7801b1a95fd622f3aee30e2a8711ce5567ca6e06cb079fed21f8d881622e402e8656e40f

  • SSDEEP

    1536:R+D2nj87P53VjNWzVBf81wuWIK9mLxp7mFxYkfP3RvEYmKq+0O7/wGfj+i:Rrj87P53VjNWzVFuEV9mLxp7mF/fvRnF

Score
10/10

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Mirai family
  • Mirai_x86corona family

Files

  • e7b9fea4f6738e070b1e7754b8480745917323e560ca6fde1fe93dd3c402ad96
    .elf linux x86