General

  • Target

    1c441e606233bbac68175731b0f35c0760a2da8e4002ef3ea36f341cf342cc79

  • Size

    180KB

  • MD5

    8f597212e27e1d04c15bd4f03bc57e85

  • SHA1

    450999d9af382b50ff4ec06c35254ace075824c8

  • SHA256

    1c441e606233bbac68175731b0f35c0760a2da8e4002ef3ea36f341cf342cc79

  • SHA512

    75d20520a66c24767b6407c3beb6f2cf63ae5d6a4f039dba79eb5c0c4b4da8c2380bb5468492f58d4287806f9bd2704a726d7713481ee0263ab2898f27bf6dd6

  • SSDEEP

    3072:RxeUjL5S021A+BTY0roeSwPpEpz+lHXwjyHa2bM9ecIzKOlv92xe3xEniwZTT:W0LMd1AKr3Pq8IQH6eUOlv92xe3xEni0

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Enemybot family
  • Mirai family
  • Mirai_x86corona family
  • family_enemybot 1 IoCs

    EnemyBot payload

Files

  • 1c441e606233bbac68175731b0f35c0760a2da8e4002ef3ea36f341cf342cc79
    .elf linux x86