General

  • Target

    c1566f52e2f69008aa9afd6ea9a82972bdf2a51d90a7a85842858134ea74de40

  • Size

    183KB

  • MD5

    87826000236f45234e67e88acc746daa

  • SHA1

    1cad5545fefc4e0b9ae5206691d3f6614a50f131

  • SHA256

    c1566f52e2f69008aa9afd6ea9a82972bdf2a51d90a7a85842858134ea74de40

  • SHA512

    40c3da3dfa0504bfb8fe0d6922bf0c3b2bd5e3084baf0bfa634ebf4c21d17985b52e08cafa8460f0770192249e48394972de87d4499300825f38abeec3465305

  • SSDEEP

    3072:KHccUp5hW/E+72TZEbCnhJZoykqSvv+CuCyBLhk2b9iOwJtwhvPjEZtIOdn+zZTT:gyvYE+72Rnhe5XJOLh9oOoSvPjEZtIOq

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Enemybot family
  • Mirai family
  • Mirai_x86corona family
  • family_enemybot 1 IoCs

    EnemyBot payload

Files

  • c1566f52e2f69008aa9afd6ea9a82972bdf2a51d90a7a85842858134ea74de40
    .elf linux x86