General

  • Target

    fx_unpack

  • Size

    128KB

  • MD5

    891928e9c2b78e9f73611efc22e1bde1

  • SHA1

    f3fed580bfd40aaea551bb10dbb52bf29f2de616

  • SHA256

    9cfc0d61c98aec746bde879a6150c87208c6256e664b854d9da77c7cfd6f6cc2

  • SHA512

    fe714bba34a4e25febd6785a6c09ec0e67c0df4a768e6680ba6101963a832945669bf331b5c427bcecaa5fb0d3b2eb83d4d6f5590d065e669f2fa03586954844

  • SSDEEP

    3072:2+80GYE1fan2ru0rY8SdVVLygnyRHIe2+0GU4piDdO1CZ/8mK6:hRrEoncRrYjPLBaRALMG/8mK6

Score
10/10

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Mirai family
  • Mirai is a prevalent Linux malware infecting exposed network devices 1 IoCs

    Detected Mirai Linux malware

  • Mirai_x86corona family

Files

  • fx_unpack
    .elf linux x86