General

  • Target

    3ddd7439f4ffc8bcb7238daf63121926bcf773279bdaf92699e6bb4f3e304acd

  • Size

    117KB

  • MD5

    f54685ab3572139bfe62091b73d5fd97

  • SHA1

    74d08de5f1351c5536e4db4951028df062ec3e85

  • SHA256

    3ddd7439f4ffc8bcb7238daf63121926bcf773279bdaf92699e6bb4f3e304acd

  • SHA512

    a0df48e4eefda4b8dca1844dc6f473a4da3ac980741628aeb2f46a06c9cd5b128491db5357bd3e77430437ada572ac6d4ff27f3c01ec4c6605f3369eb79406c6

  • SSDEEP

    3072:S5h6gQdAiGynQWvP3kDAvaVFaCln34vrg+Z0Ua3hgp6W:+h64ieUvabao3Mrg+Z0Ua3hgp6W

Score
10/10

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Mirai family
  • Mirai_x86corona family

Files

  • 3ddd7439f4ffc8bcb7238daf63121926bcf773279bdaf92699e6bb4f3e304acd
    .elf linux x86