General

  • Target

    5f6b65a372bfe982bca49e99f1ba17a57cbb5976a007bc07f1f645a2e9e6c22a

  • Size

    2.3MB

  • MD5

    05ba70eeccc4ed365a780417beb96d24

  • SHA1

    bfaf56962d2e3b17f2b482979cb83bd4a6fd64f3

  • SHA256

    5f6b65a372bfe982bca49e99f1ba17a57cbb5976a007bc07f1f645a2e9e6c22a

  • SHA512

    1e27cfafc371de7d5231700dfd11b3e180a2f00c4fd09c60d73590697034d4912d06f6d35ce57e1226995981133341c7c3f96b4c373dc6118ed505019f696f31

  • SSDEEP

    49152:3svqeeMdO3qV2afeyUPKppw3TNqdG7BPNwrnnbBzon1wj:3sU3qUJCppa18

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Enemybot family
  • Mirai family
  • Mirai_x86corona family
  • family_enemybot 1 IoCs

    EnemyBot payload

Files

  • 5f6b65a372bfe982bca49e99f1ba17a57cbb5976a007bc07f1f645a2e9e6c22a
    .elf linux x86