General

  • Target

    3dae2c5369b20f725600d7bb30c558f3125e7500706b542fbf4e9c7c679df1ca

  • Size

    67KB

  • MD5

    f10dd25bb2c704c21485bad8214443b9

  • SHA1

    591b54abbede121d93955946305d7b3288dc1d51

  • SHA256

    3dae2c5369b20f725600d7bb30c558f3125e7500706b542fbf4e9c7c679df1ca

  • SHA512

    3213f7a5ffcaaf0af6aefdfba4bf309e8493eee052050f7f8783a56efdb5551fef7624e15c6f57a0ece696185f081692e25cea605efb63a57ce477a9fa60a7f4

  • SSDEEP

    1536:UD8bYEmDIdV5LTepgWncXyaolDmF+l2OZ/fufYEZ:DbYEmDI1LeNc3YmEl2OZXufYEZ

Score
10/10

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Mirai family
  • Mirai_x86corona family

Files

  • 3dae2c5369b20f725600d7bb30c558f3125e7500706b542fbf4e9c7c679df1ca
    .elf linux x86