General

  • Target

    dfd59ddaa154c5c5b4bce50f353d6d4d9ebbbe88e95abb8539be3a4b62f2f1bf

  • Size

    70KB

  • MD5

    dcd7f4554f72df2dc466b812414b0f11

  • SHA1

    718ed4f24f52067f2e1a859f62b0f3dde4b4a00f

  • SHA256

    dfd59ddaa154c5c5b4bce50f353d6d4d9ebbbe88e95abb8539be3a4b62f2f1bf

  • SHA512

    84e4855f3e2ff33a2a20b6840566fbba3587a82be00ab23481c9164a75406f1f077b389c0c07a45405c20f817a18a174980b5ce3f922004109ad4955fdab20a5

  • SSDEEP

    1536:T7Y0MD/NQ27qLfEg8ZW087OZPmF+lVOCjUxfg71:w0MD/C2GLfcsbSZPmElVOCAxfg71

Score
10/10

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Mirai family
  • Mirai_x86corona family

Files

  • dfd59ddaa154c5c5b4bce50f353d6d4d9ebbbe88e95abb8539be3a4b62f2f1bf
    .elf linux x86