General

  • Target

    9b751752e7e5084098f1b8e126f2abe270af188f82216315c067f9a56c7fade2

  • Size

    113KB

  • MD5

    f5734d92a4195eb3cefaeeb708870efb

  • SHA1

    3d8d8ffd4f96b7dc349af964d6397b1133968f2b

  • SHA256

    9b751752e7e5084098f1b8e126f2abe270af188f82216315c067f9a56c7fade2

  • SHA512

    07c418582fc88daca018d227a38c776803e5e2104a40b39956e9a2f6ffc4268d392ef5179865f7228e483b9fb5ed95b8929031f3d63e65cec436c9b87a70d5c2

  • SSDEEP

    3072:QwLla/zS8QUGz0Xaxntk/TB9FpA1t+Z0Ua3hgp6W:u/zS8dgLjGTBDpst+Z0Ua3hgp6W

Score
10/10

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Mirai family
  • Mirai_x86corona family

Files

  • 9b751752e7e5084098f1b8e126f2abe270af188f82216315c067f9a56c7fade2
    .elf linux x86