General

  • Target

    4a9d6e1358a432948a1c00ff9443437928d63884639af1f529f53be5cfea71dd

  • Size

    109KB

  • MD5

    548c09cf690a90aca4002b256deb55f0

  • SHA1

    d956a633b8a613def7557fcc128af7cddc15dfde

  • SHA256

    4a9d6e1358a432948a1c00ff9443437928d63884639af1f529f53be5cfea71dd

  • SHA512

    9cae19e5715c2a46cc0038bd1262be200366419d51b966a12ba5ff9d5652755656c7c2ad75c9e20b883f28a07238a11759bb9721478e1a77af56e56e7fdb1d44

  • SSDEEP

    3072:1g7IQXrQa0eTSG97CdhQ30nSmZ901XGXg9Px:1YIQJ1x97CdrnSmZ901XGXg9Px

Score
10/10

Malware Config

Signatures

  • Detect Mirai payload 1 IoCs
  • Detected x86corona Mirai variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Mirai family
  • Mirai_x86corona family

Files

  • 4a9d6e1358a432948a1c00ff9443437928d63884639af1f529f53be5cfea71dd
    .elf linux x86