General

  • Target

    7fe87021308d924d4636cffe3bf3590743897e9891e2a03e2be4084f81042c93

  • Size

    71KB

  • MD5

    40ed927b828ddb55d2f29f9758587dc1

  • SHA1

    8adf820f1262ab39e7cac135b402f46a8f3bf264

  • SHA256

    7fe87021308d924d4636cffe3bf3590743897e9891e2a03e2be4084f81042c93

  • SHA512

    11f05927d562a3bf029a9624a3a401e6e8a50a2a289fce106bbd803d133850d7e26b35b33228909bbe29b5937a3515946f7704250fd93b7c6252690c052ee10d

  • SSDEEP

    1536:ZLM1Fp9tpjJLegR9otARSlEwyWpi0PqUuez+qCBEo2fm3+lVrCjmxfZp1:ZL0D9tpjJLegReAwlbQ0PLPz+zBUfmO7

Score
10/10

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Mirai family
  • Mirai_x86corona family

Files

  • 7fe87021308d924d4636cffe3bf3590743897e9891e2a03e2be4084f81042c93
    .elf linux x86