General

  • Target

    a342b1c00a1d8926a32147d45f847307c4d532e1c87d04e3294aaed59805c6d5

  • Size

    89KB

  • MD5

    9d547e6503b6b7d5efcddf6dbf26ed49

  • SHA1

    ea6afe5e6d74e2a8207f849fed44b4c5617ea5d4

  • SHA256

    a342b1c00a1d8926a32147d45f847307c4d532e1c87d04e3294aaed59805c6d5

  • SHA512

    b5aba96f6a4b204479c524c467e5aea3751cb94037703085b7e96a255c1f3195b51bb93d790e3df7593cf451af182e9ff3dbfcab8a91462d0c93690801643b43

  • SSDEEP

    1536:L0oo94SRaTaLbSEx7KaUOM0dgdkWhLubG9z2ldVu5VjFbdDNhBuD/mIc0mgkNLz3:g79bRaTkJ5MagdkIubGBadVkbpLoD/Lk

Score
10/10

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Mirai family
  • Mirai_x86corona family

Files

  • a342b1c00a1d8926a32147d45f847307c4d532e1c87d04e3294aaed59805c6d5
    .elf linux x86