General

  • Target

    i686

  • Size

    62KB

  • MD5

    a0248fc3f5d23f668433c0987adb024c

  • SHA1

    e9568eb5b4304b8cd7ae0c9bfb8b660703e333ee

  • SHA256

    e534ec51022f225da257b09fbf4ff2c8eb7dc2c3c5286ed5e45609276663b7ee

  • SHA512

    0372de571c136b8d473afac6a2d2de989414e4942a909edb434862758df2138df6a44d493ec8f895dc30eb369777eb34dc08e8a0929032ad7ccb6b6459e41805

  • SSDEEP

    1536:aP+E3Lj+FAQ2+aoQA+Jw20+vx23+nZ2FxjjcWWECpK/NAyJFp5bHnY/Gp:aPBLj7Q2gQA/20423g2F1xcpK/NAyJFl

Score
10/10

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Mirai family
  • Mirai_x86corona family

Files

  • i686
    .elf linux x86