General

  • Target

    4b5d9c2431dcb3733307a5ec355462e3be5cd48c8a12854e201e5cf83c5da3ce

  • Size

    84KB

  • MD5

    c36b00aeac23aa7a5ffa57aaa333918f

  • SHA1

    7d68f740790156f6f4be61f168e03cf0061839b2

  • SHA256

    4b5d9c2431dcb3733307a5ec355462e3be5cd48c8a12854e201e5cf83c5da3ce

  • SHA512

    0fb3e3ce2e97de5d9a35306c7be146ce115f652d240ad3f485c68e4bc42ed979da62ccff6c02dadc4b89cba1ce5a6bb6a05aafb022e720c16d54b690d1b8555b

  • SSDEEP

    1536:MthRiGU4M+EvOBdp/lqzNWKv8jTCk3xmCm5Lm7WAgcJjmAI7Hp:MtaGU4UvOd/lYN3kjWam5LmqAgcJyAI1

Score
10/10

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Mirai family
  • Mirai_x86corona family

Files

  • 4b5d9c2431dcb3733307a5ec355462e3be5cd48c8a12854e201e5cf83c5da3ce
    .elf linux x86