General

  • Target

    fac6b20655fcbb3659a36b84c1c5773d045742817d7a9594b363c24f6536c24c

  • Size

    138KB

  • MD5

    d440451f9c7557b72a3e294f949c3a58

  • SHA1

    d3c00578c6ef0c79db21b3b69c31fd967b943cf1

  • SHA256

    fac6b20655fcbb3659a36b84c1c5773d045742817d7a9594b363c24f6536c24c

  • SHA512

    3667030e88168f7ce48964f22db9a04a6158ff533bd37b6a664fc53d9789f794012582bb489fe62c8063cc639aa337fb89abf484b477622410d25afafa70abdf

  • SSDEEP

    3072:vj1MyLF+BObJGqZcdm25dAo6Y5CSTLsd/6H3+5+Ua5E4:vj1E6IqZc2o/5CSTLsd/6H3+5+Ua5E4

Score
10/10

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Mirai family
  • Mirai_x86corona family

Files

  • fac6b20655fcbb3659a36b84c1c5773d045742817d7a9594b363c24f6536c24c
    .elf linux x86