General

  • Target

    362852c72f0752d78442831b57b90b6147655f3070db6ea77a76cff8117c367f

  • Size

    54KB

  • MD5

    7d3e195c532043ae785bbc99ce643409

  • SHA1

    7230a5f8f76920242c8962912b216cda9f775d2b

  • SHA256

    362852c72f0752d78442831b57b90b6147655f3070db6ea77a76cff8117c367f

  • SHA512

    24a753c50c2ef1c311424d4b77c5894ea2c3e372c0baa9f5def9ff664e71ba32d3d611c37cf34db514664b309155c80b5f36d2a135e2c6c84c1314f4289d5a92

  • SSDEEP

    768:jbCbHHctyjeeI6yz/8hfqW8TGRSCyUm+uqWvUK9HcwQfIi6yIt3KdxmKOvVT:vEHHcgo8AWLSem+uHUKifZ6yVd8XvVT

Score
10/10

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Mirai family
  • Mirai_x86corona family

Files

  • 362852c72f0752d78442831b57b90b6147655f3070db6ea77a76cff8117c367f
    .elf linux x86