General

  • Target

    440c87acaa782ce9694e5dfb9ea03ed25903422804fbeed6a357688b9749b24d

  • Size

    122KB

  • MD5

    acc4b55ca725237ea642a44a96778cc5

  • SHA1

    1ed6dfeabf7f8b57182577db40ed33d8b24280e5

  • SHA256

    440c87acaa782ce9694e5dfb9ea03ed25903422804fbeed6a357688b9749b24d

  • SHA512

    03855c52b5c71e3b9d2c10eb907e421b66926caffb7139768d4f65836a5ac19c891cecafe26ca5bc1b0921cf083d120ee4236cf8eb586de7934b9f33cb95e283

  • SSDEEP

    3072:JmRcYwWSN4u4vlU3NSqetJ8add9QzTsNzn0t4NKcXeG2GK:JgZcEi9SqetJ8addQ+0t4NKcXd2GK

Score
10/10

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Mirai family
  • Mirai_x86corona family

Files

  • 440c87acaa782ce9694e5dfb9ea03ed25903422804fbeed6a357688b9749b24d
    .elf linux x86