General

  • Target

    0fe5272ae4dff43234525dcc2c59bb9c619fc5c4fe88be00f5519c4fb7e9e199

  • Size

    67KB

  • MD5

    943298ea9d2359249b0ab4d8075ccffe

  • SHA1

    e9e5c008d26b5ed98bf64c2d41a9b6a7a1403807

  • SHA256

    0fe5272ae4dff43234525dcc2c59bb9c619fc5c4fe88be00f5519c4fb7e9e199

  • SHA512

    a207f706c7da0e53f481d276060df84c189261ec751b742b7358ba5c3a3831cec84e71872390b3c6805e11f5491feaca7bbf98ee1b88dce183e86e1e62297bae

  • SSDEEP

    1536:5w8bIEmDIdV5LTepgWncXy2olDmF+l2OZ/fufYEZ:tbIEmDI1LeNcnYmEl2OZXufYEZ

Score
10/10

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Mirai family
  • Mirai_x86corona family

Files

  • 0fe5272ae4dff43234525dcc2c59bb9c619fc5c4fe88be00f5519c4fb7e9e199
    .elf linux x86