General

  • Target

    563cb8c26e7a5867f24f3ba21ad1d7cf923703e02788a96984c6a7f38f2d481e

  • Size

    2.3MB

  • MD5

    e2aaa15ab409d60aed6d570309a74197

  • SHA1

    cd589d31ba6f7642f0108c62908beb9eab9ac2be

  • SHA256

    563cb8c26e7a5867f24f3ba21ad1d7cf923703e02788a96984c6a7f38f2d481e

  • SHA512

    86dd3411e9d8afeaa816cc2a2a3121db3817e19de5f51a261a86565e8d74eea7ec4e00187fa29660f1a1cd371b2ac185d6561c0273bcc6173ef0ae20e4c69307

  • SSDEEP

    49152:puN/NZnKLdTaGXdUPgVpeTXw1POalxArnnwLOi1ci:p2KLF44VpT1d

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Enemybot family
  • Mirai family
  • Mirai_x86corona family
  • family_enemybot 1 IoCs

    EnemyBot payload

Files

  • 563cb8c26e7a5867f24f3ba21ad1d7cf923703e02788a96984c6a7f38f2d481e
    .elf linux x86