General

  • Target

    453c8670b101584078d8a9999ef28817fc0b356c1066084feb8c0cd9f5b88ad1

  • Size

    70KB

  • MD5

    368f959435b452859e301d9b1243729b

  • SHA1

    0c414e65573f519a0f730acc793b3eee7829acb8

  • SHA256

    453c8670b101584078d8a9999ef28817fc0b356c1066084feb8c0cd9f5b88ad1

  • SHA512

    41c03eb165532c82ae2de6458329e43d359e5cd4197988d4be73bcb0b6292b5bcbf599d293d15851b04b0493d0626a4ec717047341da96a3d4da3be8392f08f2

  • SSDEEP

    1536:WWdY0wj/NQ27qLfEg8ZW087HZPmF+lVOCjUxfg71:c0wj/C2GLfcsbTZPmElVOCAxfg71

Score
10/10

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Mirai family
  • Mirai_x86corona family

Files

  • 453c8670b101584078d8a9999ef28817fc0b356c1066084feb8c0cd9f5b88ad1
    .elf linux x86