General

  • Target

    468dda33ca0cbf61dfad4815cbfadda1e8fce9e40736d0b3b210109232952fb8

  • Size

    125KB

  • MD5

    c593ea38b81568b36c06b8f87cabfdc3

  • SHA1

    d9f4887e1e2bf7ba3ce9cf1709e443309172a2ec

  • SHA256

    468dda33ca0cbf61dfad4815cbfadda1e8fce9e40736d0b3b210109232952fb8

  • SHA512

    a5e9ba6cf041cd8733a3fa2777749de7c043d52b321afada24db18dfb413981d6f72b63bca20009026ddb497bdedc2d8b258f750391f64ceaf4dbf07ef172b60

  • SSDEEP

    3072:VCHM3D0VpjMGukizjxf7YCa+TJVZUUjToMH9SIr:8s3D0VpjMGuLra1Ot9Rr

Score
10/10

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Mirai family
  • Mirai_x86corona family

Files

  • 468dda33ca0cbf61dfad4815cbfadda1e8fce9e40736d0b3b210109232952fb8
    .elf linux x86