General

  • Target

    45db9938c96d93b094318736bfafe208f45fc84f9822ce4765b7e951e81c4c91

  • Size

    68KB

  • MD5

    c0d7ba66e483eed42863c88aa62ad430

  • SHA1

    78ce096e1b12baca2903236745cb88204b77076d

  • SHA256

    45db9938c96d93b094318736bfafe208f45fc84f9822ce4765b7e951e81c4c91

  • SHA512

    d27c5615f3a12ac0eee9bade73172f4a0217dc754f383e7b10f8eec3a52670900d7630faf9712ffbbbe637796c7cfd25715268547c24f9b8470599a7c7b8aec8

  • SSDEEP

    1536:aAapaF1c7NGLZP+Qjf/KtwXqCeIoxohRCQiMRNkcg0bvmd+lVOCjUxlZS1:aAyaM7ELZGQj6OhGCRHBjBvbvmMlVOCx

Score
10/10

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Mirai family
  • Mirai_x86corona family

Files

  • 45db9938c96d93b094318736bfafe208f45fc84f9822ce4765b7e951e81c4c91
    .elf linux x86