General

  • Target

    6e971ea426813baf05199743cb6d25e12c30b504e937bbf120fc12a3d3461609

  • Size

    67KB

  • MD5

    3eb8353bdd04b350e5df321b7693afae

  • SHA1

    bc2bc5cf2583b4044ebd0bf224bd04966e0936f7

  • SHA256

    6e971ea426813baf05199743cb6d25e12c30b504e937bbf120fc12a3d3461609

  • SHA512

    1e3c59eae1b5d200445cbfcd04c2303fd7dd109a6bacb806b76993c587b9b626be4c0c05b88a53dbb07efb246437908d6abd3cc81ac9367efddd38b53ccb90c6

  • SSDEEP

    1536:n28bQEmDIdV5LTepgWncXy5olDmF+l2OZ/fufYEZ:hbQEmDI1LeNcoYmEl2OZXufYEZ

Score
10/10

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Mirai family
  • Mirai_x86corona family

Files

  • 6e971ea426813baf05199743cb6d25e12c30b504e937bbf120fc12a3d3461609
    .elf linux x86