General

  • Target

    35ffcb822907413ea3fa6832dfbfe0e0e4abbb2bd81d56107519b394a11c1078

  • Size

    121KB

  • MD5

    5890bab1b806e19a08f735fe1ca7aeeb

  • SHA1

    c0e5bd4bdd5f42df9fe50dd1971303765a75329d

  • SHA256

    35ffcb822907413ea3fa6832dfbfe0e0e4abbb2bd81d56107519b394a11c1078

  • SHA512

    c08194f83bb93927fc3cd0395bf438d78f89198b843fe57dd2aa49066baca0e75e7bb49440b1ef7e4a932583b6eb3e1354bc5f53bd3d229f3ee77406882640fb

  • SSDEEP

    3072:6Te85PbMvcPEhVjFWfh+Sn8ctzEYoHwJ6pubg+oVUaKhgdmr:6TeZvcPEhVjFWfZ1poHK4gg+oVUaKhgo

Score
10/10

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Mirai family
  • Mirai_x86corona family

Files

  • 35ffcb822907413ea3fa6832dfbfe0e0e4abbb2bd81d56107519b394a11c1078
    .elf linux x86