General

  • Target

    b9c4db182f317055bfcdd509325687a1a59c7d37f43e09f678b0ad4990e990cc

  • Size

    67KB

  • MD5

    7e9e35078f1eab9b2a1c641ee5d7154d

  • SHA1

    50b687dcd0019a8e51d0411a89187bdc2517dc7a

  • SHA256

    b9c4db182f317055bfcdd509325687a1a59c7d37f43e09f678b0ad4990e990cc

  • SHA512

    90ffbead591e9f855a18a22120041eceef929ff98a584f035911e747f74ba78a36d2c59447ac515e2ae6ae1a212646f89a3b70cf8f9a28f9bcdbe9366726be37

  • SSDEEP

    1536:5w8bIEmDIdV5LTepgWncXy9olDmF+l2OZ/fufYEZ:tbIEmDI1LeNcwYmEl2OZXufYEZ

Score
10/10

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Mirai family
  • Mirai_x86corona family

Files

  • b9c4db182f317055bfcdd509325687a1a59c7d37f43e09f678b0ad4990e990cc
    .elf linux x86