General

  • Target

    959289e7c69577c60440ba045a8c0a642c08f310c10ebbbec6fd58cdcbccae08

  • Size

    70KB

  • MD5

    721bba5420db69e7600524a5fa593165

  • SHA1

    356ca69cab71caeb0aa76eeb5d18cf2c805a3a8c

  • SHA256

    959289e7c69577c60440ba045a8c0a642c08f310c10ebbbec6fd58cdcbccae08

  • SHA512

    4742133b284e842d36b4c2cfbf7221666f37f0084531be9326b8dafbbd8ba3b853cb7e4a1a4a0c3f45576959b319de7bc1603a7a7c4194e67e8f2b24cb6edbaa

  • SSDEEP

    1536:/taBNxGAEV8+494o9nlmqe8ThfZ9ieSggmd+lVOCjUxfg71:/tiOA4DeVplLFfzTSggmMlVOCAxfg71

Score
10/10

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Mirai family
  • Mirai_x86corona family

Files

  • 959289e7c69577c60440ba045a8c0a642c08f310c10ebbbec6fd58cdcbccae08
    .elf linux x86