General

  • Target

    38c82ed0ad1ad98b7a4b3726166fb6b99711c41b6a91337de8db292bcf7fdafb

  • Size

    75KB

  • MD5

    4882c1b9cbffa4c0b4653cb66ea42326

  • SHA1

    6a6a36d9017c3aeb796ece12abdda37969c6bf41

  • SHA256

    38c82ed0ad1ad98b7a4b3726166fb6b99711c41b6a91337de8db292bcf7fdafb

  • SHA512

    d111a81267a2e65318910ac7e6069827d99edc058905bb6a95ab9f87254d18b6163cb842408ea75d199312ce39fc18f97664c3bdc59e71d601fb48a3d2b5520b

  • SSDEEP

    1536:6EnncuHO/K0idxRWcsFmGqWq8/VogulkIsmp+oVcujnxQZa1:MuHOCLdxRWcUbhtJPmgoVcujxQZa1

Score
10/10

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Mirai family
  • Mirai_x86corona family

Files

  • 38c82ed0ad1ad98b7a4b3726166fb6b99711c41b6a91337de8db292bcf7fdafb
    .elf linux x86