General

  • Target

    i686

  • Size

    160KB

  • MD5

    a22bbefbf33a8debcc77faf0a71b689c

  • SHA1

    864fa005e2dae5bf1fe7aec7b0260d471f451631

  • SHA256

    544cc0feb4379757bac162c8507b83389125e2a3180c3c278b7017f82450a261

  • SHA512

    fcc5e634ef8e1b4645c6293307a437c475adb158bd11a1b9b0d3c9701f20591098bd73935e035f9b66a93a571acea48ea36ee0559486d92b16acfcc6708c6e98

  • SSDEEP

    3072:aBzJKT/I3F+jTmJQ06ClGyu0fTJr8vMUL11KPlB6inx2/y+j:a52uzlGUfTJgvMUL11KPlB6inx2/y+j

Score
10/10

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Mirai family
  • Mirai_x86corona family

Files

  • i686
    .elf linux x86