General

  • Target

    3bc344f199450230230422bf2a05230925dfe40c8c0d8359624938f0e3008248

  • Size

    70KB

  • MD5

    601b0e9555e7244c50301269f892ec44

  • SHA1

    69b42964858ab875c4039631e6e00b3c302cd9d2

  • SHA256

    3bc344f199450230230422bf2a05230925dfe40c8c0d8359624938f0e3008248

  • SHA512

    62bed3f12bab1afa712b9d089000acc4d1eae99c530a064c8f2af32c88962c58df78e3e978995250dd6afa585e89aafdae537867d06f455077694859c3c4bda3

  • SSDEEP

    1536:T7Y0MD/NQ27qLfEg8ZW087bZPmF+lVOCjUxfg71:w0MD/C2GLfcsbXZPmElVOCAxfg71

Score
10/10

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Mirai family
  • Mirai_x86corona family

Files

  • 3bc344f199450230230422bf2a05230925dfe40c8c0d8359624938f0e3008248
    .elf linux x86