General

  • Target

    42a10c870f3b650e83d620974fbff552ef8c953d2fde680f1172ef1af226dcd0

  • Size

    71KB

  • MD5

    3c9438443e00479b7cd8d41cb318ee3f

  • SHA1

    967b56f3ec9a7cf0dddb43249ae6a8be7a6dc1fd

  • SHA256

    42a10c870f3b650e83d620974fbff552ef8c953d2fde680f1172ef1af226dcd0

  • SHA512

    46db6ddc8bb78fce796b48f5b92b043645fcf77cfcbb5b7a771ca1f73f9a4054e4a2aff6bb3a5fdc645c60c7da81e16becb3ffe1d5ea30d4da2a9847c5d8529a

  • SSDEEP

    1536:0mcz9QJjlN/2kM0bAgmDOubEtyOH8AmOSLuCGUTm3+lVOtjUxfAE1:0m69QJjlNOkjAtD/zOH1PSJGUTmOlVOm

Score
10/10

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Mirai family
  • Mirai_x86corona family

Files

  • 42a10c870f3b650e83d620974fbff552ef8c953d2fde680f1172ef1af226dcd0
    .elf linux x86