General

  • Target

    3e3941b1238fd54592236c4c9b47a72efa6781f9e680f99fe12d19d6a35e05d2

  • Size

    117KB

  • MD5

    2dab4406d64bc8215b2e96896824f286

  • SHA1

    0f85f0e4e1e79173f8ea7ad8382096fb976cf5c7

  • SHA256

    3e3941b1238fd54592236c4c9b47a72efa6781f9e680f99fe12d19d6a35e05d2

  • SHA512

    7b77682c6a243fa23f69296e1ef80d384a8b9559ba7235b199ab4480c9f7ccd5af9d13987bc18668c376706e9c407bd87579153d33f52e65428f605b2db8b9f9

  • SSDEEP

    3072:Q9UFop3l+N1zkBJpgogv2Ea4+duiYv69ny6JP/KTiFi:Q9IGYMRdq2E4utv69ny6JHKTiFi

Score
10/10

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Mirai family
  • Mirai_x86corona family

Files

  • 3e3941b1238fd54592236c4c9b47a72efa6781f9e680f99fe12d19d6a35e05d2
    .elf linux x86