General

  • Target

    420ef848e332938cc08fec82558b7c5b4c6ee45d0bf948e19192b47288b0dec1

  • Size

    72KB

  • MD5

    7793f0c995db96b36aa5ef1d7f49af44

  • SHA1

    5d925beffd77862f408081f41dfd187c3c573e34

  • SHA256

    420ef848e332938cc08fec82558b7c5b4c6ee45d0bf948e19192b47288b0dec1

  • SHA512

    8cb31304376ab4e3aff403d0ae5276093885670246c90184505b439ce480287ded5c3c104a054bfd6d1008a3ed6372190874f5e97c5e4a95425946c688ebc478

  • SSDEEP

    1536:qpTcVGPwnVjAWnpvdTk4S3um7qasEGWqejvEKEGz2ctxomP+lVrCjmxfZp1:8cVGPwnVjAWnpFvS3um7hPz7E9+omWlJ

Score
10/10

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Mirai family
  • Mirai_x86corona family

Files

  • 420ef848e332938cc08fec82558b7c5b4c6ee45d0bf948e19192b47288b0dec1
    .elf linux x86