General

  • Target

    13aff2e0feed6fc3479b4abf44705faf58e66608c7b90aa6d5ec3211b6fecf90

  • Size

    79KB

  • MD5

    4cbdb894089a9690be396ab1103ce8f9

  • SHA1

    1ae2e8df69a2955ceb47b8abc3bc0ec159155ea6

  • SHA256

    13aff2e0feed6fc3479b4abf44705faf58e66608c7b90aa6d5ec3211b6fecf90

  • SHA512

    40245f4e6595289a21cd9d32296288001c3a135b8c6edba6c0431ce9449299de859a4a93df426884d5e9146291ece2d95cec005260c3d8940997eab2d78e4de6

  • SSDEEP

    1536:LgJ24x98xjovgMqnU7f3SPM5Kdy5vRElZTh/LoP9mdInVONj8xsqDM:Lgo+98xjopr7fSkD5v6TTh/Lo1munVOB

Score
10/10

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Mirai family
  • Mirai_x86corona family

Files

  • 13aff2e0feed6fc3479b4abf44705faf58e66608c7b90aa6d5ec3211b6fecf90
    .elf linux x86