General

  • Target

    4c80b5efe213e9d4808248f5585cad38c7b99a5461cee5f30d4b58768eb1ec13

  • Size

    72KB

  • MD5

    3bf891baee60654d57991d6682c7b00f

  • SHA1

    c150e59f5313a9be3436672b0f2aa71587c85181

  • SHA256

    4c80b5efe213e9d4808248f5585cad38c7b99a5461cee5f30d4b58768eb1ec13

  • SHA512

    d71e2600938de91cac6e097c313290c8c19f084c02144e4c5bcd0f691613c1d4ee7a78181d659bec1c9bbdac3e44d06c44331c25861d04d072b45422a892ae89

  • SSDEEP

    1536:veTcLGPwnVjAWnpdHTk4S3um7qasEGWqejpEKEGz2ctxomP+lVrCjmxfZp1:CcLGPwnVjAWnpxvS3um7hPzFE9+omWlJ

Score
10/10

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Mirai family
  • Mirai_x86corona family

Files

  • 4c80b5efe213e9d4808248f5585cad38c7b99a5461cee5f30d4b58768eb1ec13
    .elf linux x86