General

  • Target

    3700e4943da77844e9243eff759a2f09736d9c05b7d718d0fe8f0f9258a361e2

  • Size

    113KB

  • MD5

    b6d4096517717737b3264b8c31a7583a

  • SHA1

    66f5a6e841381a0920f0e0f8b21ce293ea8e1b9b

  • SHA256

    3700e4943da77844e9243eff759a2f09736d9c05b7d718d0fe8f0f9258a361e2

  • SHA512

    a03ab54c04ded7f725353d5e215c7ae7c5269cef63396e2f99f9aba860bfeb1243c0450b98916abc631adfdd7c193f393b55f95a25c738e35beb691034cac576

  • SSDEEP

    3072:Q7Lla/zS8QUGz1Xaxntk/TBM5RA1t+Z0Ua3hgp6W:j/zS8dg0jGTBWRst+Z0Ua3hgp6W

Score
10/10

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Mirai family
  • Mirai_x86corona family

Files

  • 3700e4943da77844e9243eff759a2f09736d9c05b7d718d0fe8f0f9258a361e2
    .elf linux x86