General

  • Target

    4ea272781b0d1a851383144a4b9bcaf1942aa23b8924de8bc8d2a6960550a50f

  • Size

    66KB

  • MD5

    148a1c6e25df4b51296bb2e5a346453a

  • SHA1

    0d4c1b2a7f303966d61648253e1eabf8c7640996

  • SHA256

    4ea272781b0d1a851383144a4b9bcaf1942aa23b8924de8bc8d2a6960550a50f

  • SHA512

    c43f761dda0da5e95ba4109469f76cf91612d906757359e49d9df3ff8fe01220902b9f5e35ef9dedf76520751d84650da88255a265f2a2a62b35a61269f40003

  • SSDEEP

    1536:CWVYPCJH1jUdOn4JymPWBSgSh1MtNLr/NbHBDSDmd+l2OZ/fufYEZ:CWUCJH1gdikrEHM1IFrVbJSDmMl2OZXa

Score
10/10

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Mirai family
  • Mirai_x86corona family

Files

  • 4ea272781b0d1a851383144a4b9bcaf1942aa23b8924de8bc8d2a6960550a50f
    .elf linux x86