General

  • Target

    3d90dd3074404d5a087fa8b4d4bc7054260d095c3c1334eef93bd4d89243aae5

  • Size

    75KB

  • MD5

    09aa182dd2ad1663a5a9e1ca1145290b

  • SHA1

    cef5fc9485827e8279aea6b8e01c3e284cd5d587

  • SHA256

    3d90dd3074404d5a087fa8b4d4bc7054260d095c3c1334eef93bd4d89243aae5

  • SHA512

    a5e4fabf84ebfcfcdab5b4ae6e7fd25aa60737f9b72eb292bc6db3f3cbe9ad6cc134e7611d44f1ed09a2aeb6f184d2e48b45b180e68a575575664314626c8468

  • SSDEEP

    1536:H6v3kjH2cs0q9pAgwxEWZQWWBKVLBgBc72md+oVcxjnxj5a1:RjH2PD9pAgwtKkL2mMoVcxjxj5a1

Score
10/10

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Mirai family
  • Mirai_x86corona family

Files

  • 3d90dd3074404d5a087fa8b4d4bc7054260d095c3c1334eef93bd4d89243aae5
    .elf linux x86