General

  • Target

    b6d19179c564fb0a72229b951ef209b4cbb023f110ea6b5a90fa21ac1028c497

  • Size

    71KB

  • MD5

    efb700a99f0bd05b770b7fc9fed1ac09

  • SHA1

    1ef33a0041e43ba322bfa4bbbd1433a1ab47973b

  • SHA256

    b6d19179c564fb0a72229b951ef209b4cbb023f110ea6b5a90fa21ac1028c497

  • SHA512

    4a55086ac0340c1a67382d4a563fdbde1bc71fad83fd1eddb039f3233c6c1ef13e7c4c18de7ffff94681931aa0a30bb80eb4e3a32547f89bd5f0c75371083093

  • SSDEEP

    1536:L+Jjx99ahj9VEtMTImCQbJq+JcXpu4fMb6eXCbRu8XeANm3+lVrCjmxfZp1:L+B39ahj9VESsmdJrJn4fe7SduB4mOlJ

Score
10/10

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Mirai family
  • Mirai_x86corona family

Files

  • b6d19179c564fb0a72229b951ef209b4cbb023f110ea6b5a90fa21ac1028c497
    .elf linux x86