General

  • Target

    43da62d2cadd8ec819924d5df126de9a0679956d751b1f8dfcb4d80740bbd5a2

  • Size

    148KB

  • MD5

    f0879f5a76a367007171eb28d2080035

  • SHA1

    d072bbd409b945561158991a1cd2c95656a37436

  • SHA256

    43da62d2cadd8ec819924d5df126de9a0679956d751b1f8dfcb4d80740bbd5a2

  • SHA512

    128810d2874aea0ac28e0891a0271ac2a095d6b61020b24798b1acd1e3a9caa6bb6135051c73d880d3a4d0976c1c6b83e76d65e785cc4b2dd5dccd3c1a27957e

  • SSDEEP

    3072:cMNnCSYv/oz1ZlI2b2BsaAGEj6AfQLeuaA7kkOyF8cnO:cMNCXEXXKBsaAGzAfQLeuaA7kkOyF8cO

Score
10/10

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Mirai family
  • Mirai_x86corona family

Files

  • 43da62d2cadd8ec819924d5df126de9a0679956d751b1f8dfcb4d80740bbd5a2
    .elf linux x86