General

  • Target

    ff4ec2f86039821ede838d51c4e0c8efdecf792700321402dee52526decf6fcc

  • Size

    66KB

  • MD5

    e87d36cce1f5fbf270d65dc0e5083998

  • SHA1

    6de4f443c9bcf279e572d96873b1e591a7e4d5e4

  • SHA256

    ff4ec2f86039821ede838d51c4e0c8efdecf792700321402dee52526decf6fcc

  • SHA512

    85f458a5796eda623b2f6d614188e79f1a3f6179902b44a7655c9b2cb5b6fe83f9161d38ae7ccf7747bbe06458e7ddf1c1584490ff3a9abee99d624d2fdcd386

  • SSDEEP

    1536:yA7CoWSs0GxwbfctyVtmqS81jcI/cmv7PtKOM23mng2c:yYcJT3tyVAf2cI/cmzPtKOV3mng2c

Score
10/10

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Mirai family
  • Mirai_x86corona family

Files

  • ff4ec2f86039821ede838d51c4e0c8efdecf792700321402dee52526decf6fcc
    .elf linux x86