General

  • Target

    56137eb9909d0cdfe5972d4f01230bf727c3416ad089a9da6aabebecf709e306

  • Size

    74KB

  • MD5

    e03d87a7d9ddbf17aa3681072af5ea02

  • SHA1

    048b6ce43eeeca24c119fdce5810037456506f10

  • SHA256

    56137eb9909d0cdfe5972d4f01230bf727c3416ad089a9da6aabebecf709e306

  • SHA512

    c6d42aaadf4cf2627d1c98ac7d338a4142580fbc522b408d48e350acda5b493a4228326f3d5127ab0b377ab31093dc2b635413ded1c3032eafb19d8cbab216b1

  • SSDEEP

    1536:ZB9gt21aPTHVjJWvJpwGnumkOsXLz9NI3fbYWI2ktPkEZX537mP+lVOtjUxfAE1:Wt21aPTHVjJWvJp3nucsXLz9NMFFiJ7f

Score
10/10

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Mirai family
  • Mirai_x86corona family

Files

  • 56137eb9909d0cdfe5972d4f01230bf727c3416ad089a9da6aabebecf709e306
    .elf linux x86