General

  • Target

    36898b88a403813f4c2c81cae6f84c3126d41ec099a5938d56d3abdb43fcb50d

  • Size

    98KB

  • MD5

    44ccfbef3ae3207cdfeae42d7e395227

  • SHA1

    e6db412028b1dc94dd7667d3fc1cc0733381739f

  • SHA256

    36898b88a403813f4c2c81cae6f84c3126d41ec099a5938d56d3abdb43fcb50d

  • SHA512

    89c9be467c9b25c2de91cfeb232c7a3355c168c655bc5d3c79df78964e7e437b53c614bb38d4474a7a6eb01ca3e715f7340da5cbf42a99cdbb72326d84587df6

  • SSDEEP

    3072:DUB3vJE6SBV97XsXd4x3JWcq6hmBmSK0nMPZgVX9:AJXSFUd4dkcPmBmSK0nMPZgVX9

Score
10/10

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Mirai family
  • Mirai_x86corona family

Files

  • 36898b88a403813f4c2c81cae6f84c3126d41ec099a5938d56d3abdb43fcb50d
    .elf linux x86