General

  • Target

    4cb4e53577ba2ca55737a0fd9d36178fb8df1a8ee847776bdca508d3bdf38698

  • Size

    71KB

  • MD5

    6742bb7272ea95c66ca3ee000dd0a7c7

  • SHA1

    18d8c084250f2e7c70afbe7fb994d5394954ef53

  • SHA256

    4cb4e53577ba2ca55737a0fd9d36178fb8df1a8ee847776bdca508d3bdf38698

  • SHA512

    19f5df1fbc700f3165c073e9ace85e45fb58f9742cd2daf6eecda507aea758bf527c0aa7302c30bc5fbaa4626bd7fff5f6dd7c10b938887f4543614c621183c7

  • SSDEEP

    1536:R4Btnj67P53VjNWz4Bf81wuWIK9mLxp7mFxYkMP3RvEYmKq+0O7/wGfj+i:RAj67P53VjNWz4FuEV9mLxp7mF/MvRnF

Score
10/10

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Mirai family
  • Mirai_x86corona family

Files

  • 4cb4e53577ba2ca55737a0fd9d36178fb8df1a8ee847776bdca508d3bdf38698
    .elf linux x86