General

  • Target

    368ee2312d51c3c566b9556cadabd45a175e9aed47cd00e0dd9371b271030011

  • Size

    66KB

  • MD5

    29062d96975975fe3d8437b2bf496355

  • SHA1

    47f6c112cb3bec1d7f4c6e02bff90c9f5bc15a61

  • SHA256

    368ee2312d51c3c566b9556cadabd45a175e9aed47cd00e0dd9371b271030011

  • SHA512

    c9df35c118a5f9de3ea1d3066a724fadc460bbad56cd683303d617cc4b280e0509f431fdb782b2ab59f094696d18fe23587cf6addf4dd54352d51ea881812544

  • SSDEEP

    1536:BwxDXcLlwyIwoNTta+cjhF5ndiiYxjOjfKDumdIlVOCjfxfiE1:BwRXcpwV9NkVFNdHYxCjf+umulVOCbxP

Score
10/10

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Mirai family
  • Mirai_x86corona family

Files

  • 368ee2312d51c3c566b9556cadabd45a175e9aed47cd00e0dd9371b271030011
    .elf linux x86