General

  • Target

    c12af3286dfd98d5827496f86992dfa955b7cd338969ddc05d36c07235e0c946

  • Size

    96KB

  • MD5

    82e203f405345fe31dd8c9aa48c7d576

  • SHA1

    0f4af0a195c4acf9bcbb0f67fb42e0456e748d56

  • SHA256

    c12af3286dfd98d5827496f86992dfa955b7cd338969ddc05d36c07235e0c946

  • SHA512

    c590c81545b7c259dab5dfc8efaf30fc7935c0121caf1e4736c700e5f3f40b2a3fead97b723e765bc4632ce343b01e7d0ec1e58116df0cf6603d23c0e81feb72

  • SSDEEP

    3072:4WCjQrLpnr85EdT9Oa8vqbVr7N/CEgmqAgcVyZIcBI:4f5EdTbpr7NWmqAgcVyZIcBI

Score
10/10

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Mirai family
  • Mirai_x86corona family

Files

  • c12af3286dfd98d5827496f86992dfa955b7cd338969ddc05d36c07235e0c946
    .elf linux x86