General

  • Target

    8e72b653c585745cba8831b17c470ea7

  • Size

    78KB

  • MD5

    8e72b653c585745cba8831b17c470ea7

  • SHA1

    dee917b35e8b551efba572c93551711bbd152b26

  • SHA256

    d4ee57e5eba5a9bac274bf6eaf32465ec802dc674e6b9ed0cc6acc3a6088ccc1

  • SHA512

    aad654b4029b3292aa7ce600eda5a1946a487b411118f74daf9b77e042e09b9682f67770d01b483ce1eeed04a388681044f476998b0719772870c1b0cff0661f

  • SSDEEP

    1536:dC5cZnPJ16ZFnlEtbCJDbeLgBjw9nvueJ+aRLNObdeVgw/PvlSMlVxldqHEGRVVc:8UnPJ16LnlMbC9eLgJwBxJ+aRzP/PNPh

Score
10/10

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Mirai family
  • Mirai_x86corona family

Files

  • 8e72b653c585745cba8831b17c470ea7
    .elf linux x86