General

  • Target

    429c48a9d700aaffaef2e6be837a3940f2a18d53ed4138bd82839ae93101d57c

  • Size

    71KB

  • MD5

    09f5f909b83c1c0650b5f8730d32854a

  • SHA1

    6a45ff6e82b48b10de21d3434697bf67bd88adfb

  • SHA256

    429c48a9d700aaffaef2e6be837a3940f2a18d53ed4138bd82839ae93101d57c

  • SHA512

    b55ee3879135e8c2d0de4326c4497a5ba575d72fb9c8f210aeb0b5aa53ca9f6ca4335cd79e6eda93a380aaff7b59cef72879b9db7961bdfd91d9c46647e069f0

  • SSDEEP

    1536:B6Is3GPwnVjAWnNVcBkwSahUVg40zW/MCPrEvIpvYQomP+lVrCjmxfZp1:7s3GPwnVjAWnNClSahUV8Kkm4momWlVf

Score
10/10

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Mirai family
  • Mirai_x86corona family

Files

  • 429c48a9d700aaffaef2e6be837a3940f2a18d53ed4138bd82839ae93101d57c
    .elf linux x86