General

  • Target

    2de01f0dfee56647b238103ecbff7bd6ce08b2cc630d739bff577dd94956c007

  • Size

    79KB

  • MD5

    f116aa19756c76e6055fde499b87977f

  • SHA1

    3ece83451805501bc1b87afe82216ec51602dcb0

  • SHA256

    2de01f0dfee56647b238103ecbff7bd6ce08b2cc630d739bff577dd94956c007

  • SHA512

    c8f5d4f67cdcab84826909224a9a045b013cfea702111385402794d0e7d369d07047d99ed7e6a85bfa3a0b1f80c200552a747fa68c5b5c38186c9b31e17a6034

  • SSDEEP

    1536:W2CvaFnRGt7g6jKFdRnmWjJcWLKX+1LGvswNeMmuI1VcaP04EfZR:0aFnSjjKFdFx+XCCvHm51VcaM4EfZR

Score
10/10

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Mirai family
  • Mirai_x86corona family

Files

  • 2de01f0dfee56647b238103ecbff7bd6ce08b2cc630d739bff577dd94956c007
    .elf linux x86