General

  • Target

    4311f6b20375ef95f506505d00a3a923746d0e3e457be513599f5e12fc839ee3

  • Size

    82KB

  • MD5

    dc671887f6257e2e7309147350ad1fdc

  • SHA1

    790a04d6b4a7dae46c86e9996c3739188cd2c892

  • SHA256

    4311f6b20375ef95f506505d00a3a923746d0e3e457be513599f5e12fc839ee3

  • SHA512

    9a527ab93e770a431df3c809a20058f989980684c6f72cb7b52936491eaee9fae07b700e4d430e2f4ec2394c4a649a077e0067f75a86e3b2aee802d27a70370a

  • SSDEEP

    1536:Zsoyt4rTV6A42xdvSBaCI4SPm5Z5F4M8XxWZtMatUtcZROG6gyqc:Zseg92jSB5IVP0aM8kZtx2tcZkG6gyqc

Score
10/10

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Mirai family
  • Mirai_x86corona family

Files

  • 4311f6b20375ef95f506505d00a3a923746d0e3e457be513599f5e12fc839ee3
    .elf linux x86