General

  • Target

    3b2c0d9556629cead597c3a07e1daea0f4e264a26b32563f6e6c2825e4b58b05

  • Size

    113KB

  • MD5

    62201727329642f41972d91de8fa1e99

  • SHA1

    09afed25a3f98de8859c500e4519cef13558bb5a

  • SHA256

    3b2c0d9556629cead597c3a07e1daea0f4e264a26b32563f6e6c2825e4b58b05

  • SHA512

    7e9a8c14f76ca466f1c70f0864988c082bb8629fa7386e45be7be37bf514c331f2526a31ca01353a378d1c563800ed8d301721cf8441190cc677ea402a498109

  • SSDEEP

    3072:kjWNtMhAFIjuIzWLE3svCvfgyIlYmvEvpQt+Z0Ua3hgp6W:jMhAFIpj28fgyKYmvEqt+Z0Ua3hgp6W

Score
10/10

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Mirai family
  • Mirai_x86corona family

Files

  • 3b2c0d9556629cead597c3a07e1daea0f4e264a26b32563f6e6c2825e4b58b05
    .elf linux x86