General

  • Target

    17b2dbc88251c3ad432be6e63e33610743605b4aef4cc515e6f9f45bab8a77bc

  • Size

    67KB

  • MD5

    c25555f892a2b02a34867cf98d1d13b6

  • SHA1

    ddcb880cf1447564452ed7cfaf65600b822bab63

  • SHA256

    17b2dbc88251c3ad432be6e63e33610743605b4aef4cc515e6f9f45bab8a77bc

  • SHA512

    4f98613285493945c2f49e045db74d1dbd1aea12c954d5fcab5f14fd28430301300033b680c985dfa26b1a172aa05627f7b954ea1a530ac03b004c3c63b4d099

  • SSDEEP

    1536:e98b4EmDIdV5LTepgWncXyWolDmF+l2OZ/fufYEZ:zb4EmDI1LeNc7YmEl2OZXufYEZ

Score
10/10

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Mirai family
  • Mirai_x86corona family

Files

  • 17b2dbc88251c3ad432be6e63e33610743605b4aef4cc515e6f9f45bab8a77bc
    .elf linux x86