General

  • Target

    4788eef61ceaa480474472a7b5d1de2c06b011f32543c9dbc9db728cfacaf24d

  • Size

    94KB

  • MD5

    1fa2c2311e1bc5f312e4b266239c3cd6

  • SHA1

    a7309ecbb5afa8eff9e551881741f298be4007bd

  • SHA256

    4788eef61ceaa480474472a7b5d1de2c06b011f32543c9dbc9db728cfacaf24d

  • SHA512

    510ea2ad37439c81b27a888445003d5b0a01ab93a7161dc4103a664659f030f5587390e47a82c7512d4e408c2a395dbe57fc90a64ab819e308a2cba1799ec068

  • SSDEEP

    1536:NEt6hnR2RPXaVjAW9Yrip3BO8szEs/W7sITMWQrML+ZaC2RdiQLMIlFMnkid4oic:ukR2RPXaVjAW9Yrip3BO3z2wITMWQrMY

Score
10/10

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Mirai family
  • Mirai_x86corona family

Files

  • 4788eef61ceaa480474472a7b5d1de2c06b011f32543c9dbc9db728cfacaf24d
    .elf linux x86