General

  • Target

    9df1f0b69c37564427fe333d2bbe2b5a971c17cf43e4f3062c55f5cc881da4a7

  • Size

    71KB

  • MD5

    d6e222af3210899bd0fc1221a7c071fc

  • SHA1

    12d65da633c1d8915981225a372553d3fe039f73

  • SHA256

    9df1f0b69c37564427fe333d2bbe2b5a971c17cf43e4f3062c55f5cc881da4a7

  • SHA512

    0d0eefc0e61212498711e8bf00c86fba6af53275542b33647647a50e959584e4ec272eb964e6604131ee0fdf32dc8bd8d4bc48e33b5056da5401f36ea5395fd2

  • SSDEEP

    1536:Q5MS9UJjJsFckq583I4+HCin8tyqH8AKRS3L8bet/IOm3+lVOtjUxfAE1:Q5D9UJjJKdqcI9Hv3qH1cSAb+/IOmOlt

Score
10/10

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Mirai family
  • Mirai_x86corona family

Files

  • 9df1f0b69c37564427fe333d2bbe2b5a971c17cf43e4f3062c55f5cc881da4a7
    .elf linux x86