General

  • Target

    3e88ad01b2257d3ffb40d660a32ecefb3d52e17f534365b8d87e1d4a4dc39488

  • Size

    118KB

  • MD5

    560f96c63c18f437f16b314309aff00e

  • SHA1

    a9c038eba52a160c458f7513cc1ba2c7098a635f

  • SHA256

    3e88ad01b2257d3ffb40d660a32ecefb3d52e17f534365b8d87e1d4a4dc39488

  • SHA512

    581d8d0c6afae0abade4e0c3906707bb40e63315196571eb849f5409bdcda65cc7bee3594265e5c48d60020c1126d1214d56f16139558d17cca83acf8657fc49

  • SSDEEP

    3072:kAkdo3zjYbTyWbXXdRNYdbmjAUv69ny6JP/KTiFi:kA3zjOPztRNgmj1v69ny6JHKTiFi

Score
10/10

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Mirai family
  • Mirai_x86corona family

Files

  • 3e88ad01b2257d3ffb40d660a32ecefb3d52e17f534365b8d87e1d4a4dc39488
    .elf linux x86