General

  • Target

    36c53e8dbf1c9c647ab99eb2fd114455d9b844acc1c2837d4352d1c795f2504f

  • Size

    70KB

  • MD5

    5e475de3c590db3150f603768c66a76b

  • SHA1

    5ab530652db7e4cddfd280bc5001d292ec16da01

  • SHA256

    36c53e8dbf1c9c647ab99eb2fd114455d9b844acc1c2837d4352d1c795f2504f

  • SHA512

    55956352d83609cf1501a654600e2c1f955c414041de3584b8d08af8643b7d3840ef7d19eecd5da3559e11e2aab4435caa4bcfaf97ca01050df4aa275a93e4a5

  • SSDEEP

    1536:+UaBNJG8EV8+494o9nlmqe8ThfZ9i6Sggmd+lVOCjUxfg71:+Uiu84DeVplLFfz7SggmMlVOCAxfg71

Score
10/10

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Mirai family
  • Mirai_x86corona family

Files

  • 36c53e8dbf1c9c647ab99eb2fd114455d9b844acc1c2837d4352d1c795f2504f
    .elf linux x86